pawb.fun is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance aimed at any and all within the furry fandom, though anyone is welcome! We're friendly towards members of the LGBTQ+ community and aiming to offer a safe space for our users.

Server stats:

304
active users

#blueteam

1 post1 participant0 posts today
Lenin alevski 🕵️💻<p>How can a DNS mail record be used to trick you into giving up your login credentials? 📨😕</p><p>Researchers at Infoblox have identified a phishing-as-a-service (PhaaS) platform called Morphing Meerkat that’s been quietly operating for over five years. What makes it notable is its use of DNS MX (Mail Exchange) records in ways rarely reported before. Instead of the usual static phishing page setups, Morphing Meerkat queries the victim’s email provider’s MX record—using DNS-over-HTTPS via Google or Cloudflare—to tailor the phishing page dynamically. This means victims are shown spoofed login interfaces that mimic the exact service they use, complete with matching branding and pre-filled email fields.</p><p>The platform supports more than 114 brand templates and uses obfuscated JavaScript to evade detection. It also includes built-in translation capabilities based on browser profile or geolocation, making the fake login pages appear native to the user's language. Earlier versions began in 2020 targeting just five email services (Gmail, Outlook, Yahoo, AOL, Office 365). By mid-2023, they could generate phishing pages dynamically using MX records and now operate in over a dozen languages.</p><p>Morphing Meerkat campaigns rely on a set of centralized email servers, primarily hosted by UK ISP iomart and US-based HostPapa, indicating a coordinated infrastructure rather than a loose network of attackers. The phishing emails often impersonate trusted services—banks, shipping companies, etc.—and are distributed using compromised WordPress sites, open redirects from platforms like Google’s DoubleClick, and embedded links in shortened URLs.</p><p>Once a user submits credentials, the system may display a fake “Invalid Password” error to lure them into re-entering data, after which they are redirected to the real login page. This not only reduces suspicion but also increases the chance of capturing correct credentials. Stolen data is sent back via AJAX, PHP scripts, or Telegram bots, sometimes with evidence removed in real-time.</p><p>This operation shows a deep understanding of modern security blind spots—including how content delivery and DNS infrastructure can be turned against end users.</p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Sajid Nawaz Khan :donor:<p>For hobbyist Cobalt Strike Beacon collectors, note that the recently announced 4.11 update introduces a number of changes to frustrate Beacon configuration extraction, namely through the new `transform-obfuscate` field.</p><p>When set, this field can apply multiple layers of encoding, encryption and compression (with some recent Beacons observed with a 32 byte XOR key, configurable upto 2048 bytes!).</p><p>While still reasonably trivial to decode manually, standard automated workflows (say, through the SentinelOne parser) will now fail, not least because of changes to the well-known field markers.</p><p>Beacons with these characteristics have thus far been observed with watermarks indicative of licensed instances, though I imagine it is only a matter of time before the 4.11 capabilities become accessible to all manner of miscreants.</p><p>A sample configuration, via a staged Beacon on 104.42.26[.]200 is attached, including the three distinct XOR keys used to decode it.</p><p><a href="https://www.cobaltstrike.com/blog/cobalt-strike-411-shh-beacon-is-sleeping" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cobaltstrike.com/blog/cobalt-s</span><span class="invisible">trike-411-shh-beacon-is-sleeping</span></a></p><p><a href="https://infosec.exchange/tags/cobaltstrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cobaltstrike</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a></p>
🌱 Ligniform :donor:​<p>Back on my boring post grind to document my learning. </p><p>New <a href="https://infosec.exchange/tags/Blog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blog</span></a> post going through a <a href="https://infosec.exchange/tags/TryHackMe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TryHackMe</span></a> challenge. This time detecting two different attack types with snort!</p><p><a href="https://ligniform.blog/posts/snort-live-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ligniform.blog/posts/snort-liv</span><span class="invisible">e-attacks/</span></a></p><p>💜 🌱 </p><p><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Learning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Learning</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a></p>
Neil Craig<p>Akamai has what I personally think is a seriously risky mechanism for debugging HTTP requests/responses. You can send an HTTP request header of `pragma: akamai-x-get-extracted-values` for a URL served via Akamai &amp; it'll return `x-akamai-session-info` response headers which include user-defined config variables - that's where the main risk is IMO. People may well not realise this feature exists &amp; use the vars for sensitive info e.g. backend auth keys.<br>1/2<br><a href="https://mastodon.social/tags/Akamai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Akamai</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/ReadTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReadTeam</span></a> <a href="https://mastodon.social/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a></p>
Neil Craig<p>Of course, there are other ways to configure sensitive values but I don't think it's necessarily obvious or front of mind when updating config and I honestly can't see (as someone who configures multiple services on Akamai regularly) why this feature is needed.<br>Unsure if it can be disabled or auth'd but I don't see any way to do that.<br>There are some docs which cover it a little bit: <a href="https://techdocs.akamai.com/download-delivery/docs/test-your-dd-property#4-install-an-extension" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techdocs.akamai.com/download-d</span><span class="invisible">elivery/docs/test-your-dd-property#4-install-an-extension</span></a>. <br>Just though it might not be common knowledge.<br>2/2<br><a href="https://mastodon.social/tags/Akamai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Akamai</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/ReadTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReadTeam</span></a> <a href="https://mastodon.social/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a></p>
Max Maass :donor:<p>Last week, I finally finished my writeup of a vulnerability based on a misuse of <a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> that we found a while back in a penetration test. It's my favorite vulnerability so far, as it relies on abusing basic properties of unauthenticated encryption and shows, in a real-world scenario, how such seemingly theoretical issues can compromise an entire system. In the end, it's a teachable moment about both cryptography and secure software architecture.</p><p>I had the draft lying around for more than a year, but reading the articles by <span class="h-card" translate="no"><a href="https://furry.engineer/@soatok" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>soatok</span></a></span> finally reminded me that I should really wrap this up and post it. So, here it is: <a href="https://blog.maass.xyz/encryption-isnt-enough-compromising-a-payment-processor-using-math" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.maass.xyz/encryption-isnt</span><span class="invisible">-enough-compromising-a-payment-processor-using-math</span></a></p><p><a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/SoftwareArchitecture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareArchitecture</span></a></p>
donkey<p><a href="https://unfufadoo.net/tags/donkey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>donkey</span></a> <a href="https://unfufadoo.net/tags/Democrat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Democrat</span></a> <a href="https://unfufadoo.net/tags/MastodonForHarris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MastodonForHarris</span></a> <a href="https://unfufadoo.net/tags/images" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>images</span></a> <a href="https://unfufadoo.net/tags/kamala2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kamala2024</span></a> <a href="https://unfufadoo.net/tags/VoteBlueToSaveDemocracy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VoteBlueToSaveDemocracy</span></a> <a href="https://unfufadoo.net/tags/memes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memes</span></a> <a href="https://unfufadoo.net/tags/photos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>photos</span></a> <a href="https://unfufadoo.net/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a></p>
Loshana Aloka<p>Decided to take a jab here to hunt down a job as well, so here it goes. I am a recent graduate (major in computer security) looking for an entry-level (intern/junior) position to get some industry experience and training under my belt.</p><p>I am looking for either:</p><ul><li>system management oriented roles like tech support, DevOps, SRE and so on</li><li>security operations roles (SoCs or blue team roles)</li></ul><p>I am based in Sri Lanka and the offer has to be in Sri Lanka or a remote one. But, I am open for any interesting offers and discussion. You can know more about me here: <a href="https://comradelab.win/about/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">comradelab.win/about/</span><span class="invisible"></span></a></p><p>Thanks for the read and have a nice day :)<br><a href="https://infosec.exchange/tags/FediHire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediHire</span></a> <a href="https://infosec.exchange/tags/fedijobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedijobs</span></a> <a href="https://infosec.exchange/tags/getfedihired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getfedihired</span></a> <a href="https://infosec.exchange/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a></p>
Mike Sheward<p>Mini Blue Team Diaries Story:</p><p>At one time, I was responsible for security operations team at an app that had business travel booking capabilities. Flights, hotel etc. Because it was business travel, a lot of places had set up dedicated p-card's for travel booking expenses etc, rather than requiring employees or whoever to supply their own.</p><p>We had a lot of customers who were higher education sector places, who at the time, used SSO from their University ID systems, but did not enforce MFA.</p><p>What this led to, was a lot of phishing of those customer credentials - and then a lot of hopping into our system.</p><p>One of our other features - was the ability for the end user to book 'guest travel', meaning an extra ticket or two for other people - not just themselves. That was an optional feature, but a lot of people enabled it.</p><p>One fella discovered that if he got access to our system via phishing, and he found a target that had all the right things in place (p-card, guest booking), he could essentially book tickets and hotels wherever he wanted.</p><p>Now, he wasn't always able to get away with it. Sometimes things would require an approver, sometimes, an employee would notice something and cancel it before the tickets were issued - so he shifted his MO to essentially book the tickets an hour and a bit before the flight left, so he could get people on planes ASAP.</p><p>We of course advised all of our customers with SSO enabled to use MFA (and offered it ourselves). But, it was slow going at the time. So to help out we built a lot of detection capabilities. Abnormal IP's on logins would trigger alerts. Trips with guest booking enabled would trip other alerts etc - and we'd be able to shut it down. We (SecOps) got quite effective at picking these off in real time.</p><p>Now, you're probably wondering - how did we know it was a fella, and how did we know his MO and why he did it the way he did?</p><p>Well, the dude liked to travel himself, so his name would pop up in the attempted bookings more often than others.</p><p>Then we found him online. He had a 'travel agency' business. So we called him up, and asked to book some travel. He explained how in order to get super cheap tickets, we'd need to go to the airport, and how sometimes (presumably because we'd mostly shut it down with our detections), his methods didn't work.</p><p>Then we explained who we were. "Wow, yeah I've had a good run, time to move on to something else, good job to you," he said.</p><p>So the lesson is - anyone can become a platform company that other people build businesses on.</p><p>Read more stories like this at <a href="https://www.infosecdiaries.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">infosecdiaries.com/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>Writing a forensics guide for routers and switches, big (corporate networks, service providers) and small (DSL, home wifi etc). What steps/tips would you recommend when performing DFIR? What would you like more ideas on? Where are the gaps?</p><p><a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a>, <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a>, <a href="https://infosec.exchange/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a>, <a href="https://infosec.exchange/tags/routers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>routers</span></a></p>
RDP Snitch<p>2025-01-08 RDP <a href="https://infosec.exchange/tags/Honeypot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Honeypot</span></a> IOCs - 350 scans<br>Thread with top 3 features in each category and links to the full dataset<br><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a></p><p>Top IPs:<br>68.183.88.109 - 200<br>185.42.12.81 - 16<br>185.170.144.198 - 16</p><p>Top ASNs:<br>AS14061 - 226<br>AS396982 - 24<br>AS59425 - 18</p><p>Top Accounts:<br>hello - 254<br>Administr - 24<br>Domain - 18</p><p>Top ISPs:<br>DigitalOcean, LLC - 226<br>Chang Way Technologies Co. Limited - 24<br>Google LLC - 24</p><p>Top Clients:<br>Unknown - 350</p><p>Top Software:<br>Unknown - 350</p><p>Top Keyboards:<br>Unknown - 350</p><p>Top IP Classification:<br>hosting - 248<br>Unknown - 64<br>proxy - 24</p><p>Pastebin links with full 24-hr RDP Honeypot IOC Lists:<br><a href="https://pastebin.com/7emQHvAD" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pastebin.com/7emQHvAD</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a> <a href="https://infosec.exchange/tags/Blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blueteam</span></a> <a href="https://infosec.exchange/tags/SecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecOps</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a></p>
Martin Rothe ⚡<p>Anyone seeing a significant uptick in SSLVPN brute force (specifically fortigate) in the last 24h? Looks like cred stuffing with some fairly targeted usernames but can't see them in any public breaches. Observed against multiple UK companies in different industry verticals. <br>Greynoise shows the source IPs from Russia and Latvia hitting various alt-https ports (4443, 8443,9433) <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/fortigate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fortigate</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a></p>
donkey<p><a href="https://unfufadoo.net/tags/donkey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>donkey</span></a> <a href="https://unfufadoo.net/tags/VoteBlueToSaveDemocracy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VoteBlueToSaveDemocracy</span></a> <a href="https://unfufadoo.net/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://unfufadoo.net/tags/kamala2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kamala2024</span></a> <a href="https://unfufadoo.net/tags/MastodonForHarris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MastodonForHarris</span></a> <a href="https://unfufadoo.net/tags/photos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>photos</span></a> <a href="https://unfufadoo.net/tags/memes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memes</span></a> <a href="https://unfufadoo.net/tags/Democrat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Democrat</span></a> <a href="https://unfufadoo.net/tags/images" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>images</span></a></p>
donkey<p><a href="https://unfufadoo.net/tags/donkey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>donkey</span></a> <a href="https://unfufadoo.net/tags/memes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memes</span></a> <a href="https://unfufadoo.net/tags/VoteBlueToSaveDemocracy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VoteBlueToSaveDemocracy</span></a> <a href="https://unfufadoo.net/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://unfufadoo.net/tags/Democrat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Democrat</span></a> <a href="https://unfufadoo.net/tags/kamala2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kamala2024</span></a> <a href="https://unfufadoo.net/tags/MastodonForHarris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MastodonForHarris</span></a> <a href="https://unfufadoo.net/tags/images" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>images</span></a> <a href="https://unfufadoo.net/tags/photos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>photos</span></a></p>
RealGravitas -Citizen Saboteur<p><span class="h-card" translate="no"><a href="https://hachyderm.io/@mekkaokereke" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mekkaokereke</span></a></span> <span class="h-card" translate="no"><a href="https://mas.to/@carnage4life" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>carnage4life</span></a></span> I never picked up on the “caravan” bit. Thanks tor that connection. </p><p>I want you to know that I personally have attempted to contact over 600 voters as part of our city’s GOTV effort. I’ll probably hit another 200 today and maybe more next weekend. I believe enthusiasm will win this one, and there’s a lot of reasons for the <a href="https://sfba.social/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> to be enthusiastic. There’s a lot of people doing what I’m doing across the country. I hope it’s enough. <a href="https://sfba.social/tags/voteblue" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>voteblue</span></a></p>
donkey<p><a href="https://unfufadoo.net/tags/donkey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>donkey</span></a> <a href="https://unfufadoo.net/tags/memes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memes</span></a> <a href="https://unfufadoo.net/tags/images" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>images</span></a> <a href="https://unfufadoo.net/tags/MastodonForHarris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MastodonForHarris</span></a> <a href="https://unfufadoo.net/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://unfufadoo.net/tags/VoteBlueToSaveDemocracy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VoteBlueToSaveDemocracy</span></a> <a href="https://unfufadoo.net/tags/kamala2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kamala2024</span></a> <a href="https://unfufadoo.net/tags/Democrat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Democrat</span></a> <a href="https://unfufadoo.net/tags/photos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>photos</span></a></p>
Martin Boller 🇺🇦 :tux: :freebsd: :windows: :mastodon:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@hack_lu" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hack_lu</span></a></span> thanks for an awesome conference, keep up the <strong>FANTASTIC</strong> work you all do.</p><p>Here's the ramblings of a tired old man who loved being there.</p><p><a href="https://www.infosecworrier.dk/blog/2024/10/hacklu2024.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">infosecworrier.dk/blog/2024/10</span><span class="invisible">/hacklu2024.html</span></a></p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@ministraitor" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ministraitor</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@claushoumann" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>claushoumann</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@grumpy4n6" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grumpy4n6</span></a></span> (let's go together 2025) <a href="https://infosec.exchange/tags/hacklu2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacklu2024</span></a> <a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> <a href="https://infosec.exchange/tags/Defender" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Defender</span></a> <a href="https://infosec.exchange/tags/Attacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Attacker</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/KubeHound" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KubeHound</span></a> <a href="https://infosec.exchange/tags/Copilot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Copilot</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/OT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OT</span></a> <a href="https://infosec.exchange/tags/Kunai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kunai</span></a> <a href="https://infosec.exchange/tags/Zeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zeek</span></a> <a href="https://infosec.exchange/tags/Galah" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Galah</span></a></p>
donkey<p><a href="https://unfufadoo.net/tags/donkey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>donkey</span></a> <a href="https://unfufadoo.net/tags/kamala2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kamala2024</span></a> <a href="https://unfufadoo.net/tags/VoteBlueToSaveDemocracy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VoteBlueToSaveDemocracy</span></a> <a href="https://unfufadoo.net/tags/MastodonForHarris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MastodonForHarris</span></a> <a href="https://unfufadoo.net/tags/Democrat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Democrat</span></a> <a href="https://unfufadoo.net/tags/photos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>photos</span></a> <a href="https://unfufadoo.net/tags/memes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memes</span></a> <a href="https://unfufadoo.net/tags/images" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>images</span></a> <a href="https://unfufadoo.net/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a></p>
Pope Bob the Unsane<p>How do I find <a href="https://kolektiva.social/tags/MutualAid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MutualAid</span></a> <a href="https://kolektiva.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> work?</p><p><a href="https://aisleofbob.com/consulting" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">aisleofbob.com/consulting</span><span class="invisible"></span></a></p><p><a href="https://kolektiva.social/tags/GetFediHired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GetFediHired</span></a> <a href="https://kolektiva.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://kolektiva.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://kolektiva.social/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://kolektiva.social/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p>
donkey<p><a href="https://unfufadoo.net/tags/donkey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>donkey</span></a> <a href="https://unfufadoo.net/tags/memes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memes</span></a> <a href="https://unfufadoo.net/tags/photos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>photos</span></a> <a href="https://unfufadoo.net/tags/images" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>images</span></a> <a href="https://unfufadoo.net/tags/kamala2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kamala2024</span></a> <a href="https://unfufadoo.net/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://unfufadoo.net/tags/MastodonForHarris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MastodonForHarris</span></a> <a href="https://unfufadoo.net/tags/Democrat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Democrat</span></a> <a href="https://unfufadoo.net/tags/VoteBlueToSaveDemocracy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VoteBlueToSaveDemocracy</span></a></p>