pawb.fun is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance aimed at any and all within the furry fandom, though anyone is welcome! We're friendly towards members of the LGBTQ+ community and aiming to offer a safe space for our users.

Server stats:

311
active users

#offensivesecurity

0 posts0 participants0 posts today
0x40k<p>Whoa, the IT security world was on FIRE this week! 🤯 Open source supply chain attacks, malware sneaking into the Play Store, ransomware bypassing EDR... and is AI just pouring gasoline on the phishing flames?! Seriously intense! 😳 Cloud security's getting a raw deal and let's be real, backups are only as good as their security.</p><p>It's wild how rapidly the threat landscape's evolving, isn't it? Gotta stay sharp, folks! Automated vulnerability scans? They're definitely nice, but manual penetration tests are still essential. And AI? Awesome tech, but also seriously risky. Disinformation and manipulation are spiraling out of control. We've gotta stay vigilant!</p><p>So, what are *your* biggest IT security pain points right now? Spill the beans!</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/offensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offensiveSecurity</span></a></p>
pentest-tools.com<p>If you didn't care, you wouldn't...</p><p>👀 spend hours with your eyes glued to the screen<br>🧠 pour over write-ups, articles, and threads<br>⚡️ dedicate so much of your energy and life to the good fight.</p><p>Working in <a href="https://infosec.exchange/tags/offensivesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offensivesecurity</span></a> is more than a job. It's a way to make the world better. </p><p>PS: Check out the free tools and resources (including a hacking playground) on our website to give your curiosity a workout. 💪 <a href="https://pentest-tools.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pentest-tools.com/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/penetrationtesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>penetrationtesting</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Amélie Koran<p>You know, a few months ago I said I was <a href="https://infosec.exchange/tags/hiring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hiring</span></a>, I am now. So, if you're interested in <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>, <a href="https://infosec.exchange/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a>, <a href="https://infosec.exchange/tags/Omnichannel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Omnichannel</span></a> and get <a href="https://infosec.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffensiveSecurity</span></a> at a <a href="https://infosec.exchange/tags/global" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>global</span></a> scale, apply now. 

</p><p><a href="https://walmart.wd5.myworkdayjobs.com/WalmartExternal/job/Reston-VA/Staff--Incident-Response-Engineer---AI-Red-Team_R-1895939-1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">walmart.wd5.myworkdayjobs.com/</span><span class="invisible">WalmartExternal/job/Reston-VA/Staff--Incident-Response-Engineer---AI-Red-Team_R-1895939-1</span></a></p>
Bishop Fox<p>Join our session to get real-world perspective into the necessity of <a href="https://infosec.exchange/tags/RedTeaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeaming</span></a>; Trevin Edgeworth (Bishop Fox Red Team Practice Director) will delve into how this key <a href="https://infosec.exchange/tags/offensivesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offensivesecurity</span></a> practice can help unveil <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> gaps, optimize resource allocation, and deliver scenario-based <a href="https://infosec.exchange/tags/testing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>testing</span></a>. Register for this event happening October 24th! <a href="https://bfx.social/3Q44Cpa" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bfx.social/3Q44Cpa</span><span class="invisible"></span></a></p>
Bishop Fox<p>Check out this <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> resource guide we compiled to help people build up their ethical <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> skills! </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/offensivesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offensivesecurity</span></a> </p><p><a href="https://bfx.social/3LUFleu" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bfx.social/3LUFleu</span><span class="invisible"></span></a></p>
Bishop Fox<p>Announcing “The Offensive Security Blueprint for Financial Services.” </p><p>Derived from the 2023 <a href="https://infosec.exchange/tags/PonemonInstitute" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PonemonInstitute</span></a> report, this industry cut provides a temperature check of the state of <a href="https://infosec.exchange/tags/offensivesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offensivesecurity</span></a> in <a href="https://infosec.exchange/tags/FinServ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FinServ</span></a>. </p><p>Get your copy and begin refining your <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> strategy today! <a href="https://bfx.social/48lV3sU" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bfx.social/48lV3sU</span><span class="invisible"></span></a></p>
averagesecurityguy<p>It's been about a week since this happened so I'm probably cool-headed enough to talk about it. First a little background info.</p><p>A sales person from Offensive Security (<a href="https://www.offsec.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">offsec.com/</span><span class="invisible"></span></a>) has been trying to reach out to me for days. First by work email, which I ignored, then through my personal LinkedIn account, which I also ignored.</p><p>Then, last week, my son texts me and says, "some guy called me looking for you." I told him I was your son and he said he would try to email. I know that absolutely no one in my professional circle has my son's personal cell number, so I asked him to send me the number that called him.</p><p>I call the number back and it's the sales guy from Offensive Security. I immediately asked him how he got my son's number and found out it was part of a ZoomInfo (<a href="https://www.zoominfo.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">zoominfo.com/</span><span class="invisible"></span></a>) record for me. I told him to immediately delete any record he has with my son's information.</p><p>I then let him know in no uncertain terms that his company was using some shady data gathering practices if they had my son's cell number and because of that I will personally never do business with OffSec again. I also made it clear that he should never reach out to me again.</p><p>Even though I hold the <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> and <a href="https://infosec.exchange/tags/OSCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCE</span></a> certifications and even though they were a career changer for me and for my colleagues, I will no longer do business with their company.</p><p><a href="https://infosec.exchange/tags/OffSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffSec</span></a> <a href="https://infosec.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffensiveSecurity</span></a></p>
mauvehed 🐿️ (KØMVH)<p>RedTeamVillage is back at it for DEF CON 31 with a new electronic badge! We've been working on something extra special this year for DEF CON...we will be pre-selling a select amount of our 2023 badges, so order yours now!</p><p><a href="https://redteamvillage.square.site/product/dc31badge/2" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">redteamvillage.square.site/pro</span><span class="invisible">duct/dc31badge/2</span></a></p><p><a href="https://defcon.social/tags/DEFCON" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DEFCON</span></a> <a href="https://defcon.social/tags/DEFCON31" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DEFCON31</span></a> <a href="https://defcon.social/tags/RedTeamVillage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeamVillage</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <a href="https://defcon.social/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffensiveSecurity</span></a></p>
Rishi :verifiedpurple:<p>Many a times <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> folks ask about <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> or <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> &amp; the what's one of the most important thing in it.</p><p>Lemme tell you, the skills, attack-lifecycle, MITRE, evasion techniques are ever-evolving, and frankly can be learned &amp; taught. Though I may want some baseline to fit you in the team, but it's not a deal breaker if you are eager to learn. To me it boils down to is how you perceive <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a>, how can you explain complex concepts in simpler terms away from the buzz words with some daily life analogies. How you write reports, communicate, deliver briefings etc.</p><p>If you miss this narrative coming out of an amazing gig (got the flags, hacked the sh** out of the application, environment, whatever) and couldn't articulate in the report - your stakeholder is like "sorry we didn't understand”. And worse if they didn't understand the <a href="https://infosec.exchange/tags/impact" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>impact</span></a> the <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> may have; they ain’t fixing it, my friend &amp; event getting a write-off on it aka. <a href="https://infosec.exchange/tags/risk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>risk</span></a>-acceptance </p><p>Work with your <a href="https://infosec.exchange/tags/clients" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clients</span></a>, <a href="https://infosec.exchange/tags/stakeholders" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stakeholders</span></a>, <a href="https://infosec.exchange/tags/businesses" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>businesses</span></a> as <a href="https://infosec.exchange/tags/partners" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>partners</span></a>, as extended teams. Sometimes, we have to educate them to have a secure ecosystem. Please understand - If they lose, we lose in making world a safer place. My boss once mentioned to me "Rishi, no matter how well you do, it's often the <a href="https://infosec.exchange/tags/perception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>perception</span></a> of your clients that will define the outcome”. So, while we have the facts, skills etc. but if your stakeholder didn't understand or didn't have a good experience, they won't be paying attention to you. Period.</p><p>So next time your do your <a href="https://infosec.exchange/tags/SANS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SANS</span></a>, <a href="https://infosec.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffensiveSecurity</span></a>, <a href="https://infosec.exchange/tags/CREST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CREST</span></a>, <a href="https://infosec.exchange/tags/PentesterAcademy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PentesterAcademy</span></a>, remember to understand and try to explain the concept to you non-tech friend, partner, sibling and if they get it - you are in the right space to grow.</p><p>Why should you listen to me? Fair point.<br>I have been in this space for nearly 2 decades, and have gone through 1000s of such reports, talked to 100s of clients - tech folks, CXO, board, public forums .. and have sat on both sides of table; suffered enough burns to engrain this in my approach. </p><p>While you have skills in the binary world, have <a href="https://infosec.exchange/tags/empathy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>empathy</span></a> in the real world and sometimes it may take some effort educating them. </p><p>Tags: <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://infosec.exchange/tags/wickedwildworld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wickedwildworld</span></a> <a href="https://infosec.exchange/tags/audit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>audit</span></a><br>%toot_12%</p>
Tom Eston :verified:<p>Hello! 👋 I believe an <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> is in order…</p><p>I’ve been in <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> for over 17 years 😀</p><p>Most of my career has been in offensive security. I started out as a pentester and did a lot of <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> stuff (before <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> was red teaming), <a href="https://infosec.exchange/tags/physicalsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>physicalsecurity</span></a>, <a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a>, and was even a developer for a short period of time 😬. Got the <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> bug until I moved into management/leadership roles. But <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> is still my “technical” passion. I’m currently the AVP of Consulting at Bishop Fox where I lead several teams of super talented and amazing hackers! 🦊</p><p>While I was getting into pentesting, I did a bunch of research on the security and privacy of social networks right around the time social was in its infancy (circa 2008). Got to speak about that at a bunch of conferences back in the day which allowed me to meet some amazing people (including many of the OG <a href="https://infosec.exchange/tags/sectwits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sectwits</span></a>). That was around the time I also got into <a href="https://infosec.exchange/tags/podcasting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podcasting</span></a> and started the Social Media Security Podcast which later became <span class="h-card"><a href="https://infosec.exchange/@sharedsecurity" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sharedsecurity</span></a></span>. I’ve been podcasting for over 13 years now!</p><p>I admit I was more of a lurker on the birdapp but mostly because I found real engagement difficult plus I wasn’t a fan of the toxicity (especially more recently). So far Mastodon feels very different and almost like the original birdapp before algorithms and the mess we see today.</p><p>Anyway, I’ll be tooting about <a href="https://infosec.exchange/tags/offensivesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offensivesecurity</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/leadership" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leadership</span></a> <a href="https://infosec.exchange/tags/careers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>careers</span></a> <a href="https://infosec.exchange/tags/podcasting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podcasting</span></a> and probably <a href="https://infosec.exchange/tags/cats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cats</span></a>. I happen to have 5 of them! 😺</p>
Zack<p>Just found this <a href="https://ioc.exchange/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> based project:</p><p><a href="https://www.secbsd.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">secbsd.org/</span><span class="invisible"></span></a></p><p>Still in alpha testing !</p><p>Contributors needed...</p><p><a href="https://ioc.exchange/tags/BSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSD</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://ioc.exchange/tags/floss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>floss</span></a> <a href="https://ioc.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://ioc.exchange/tags/cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersécurité</span></a> <a href="https://ioc.exchange/tags/testdintrusion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>testdintrusion</span></a> <a href="https://ioc.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://ioc.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://ioc.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://ioc.exchange/tags/FullDiskEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FullDiskEncryption</span></a> <a href="https://ioc.exchange/tags/BugHunters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugHunters</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/SecurityResearchers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityResearchers</span></a> <a href="https://ioc.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffensiveSecurity</span></a> <a href="https://ioc.exchange/tags/DefensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DefensiveSecurity</span></a></p>