digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

814
active users

#whitehat

0 posts0 participants0 posts today
SciPunkIn the movie Hackers (1995), a group of nerds hack into computer networks to outsmart corrupt authorities and uncover a conspiracy. <br> <br> The film features a mix of retro computing aesthetics, cyberpunk themes, and real-life cybersecurity concepts like sudo and root access.<br> <br> <br> <br> <a href="https://pixelfed.social/discover/tags/hackers?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#hackers</a> <a href="https://pixelfed.social/discover/tags/retro?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#retro</a> <a href="https://pixelfed.social/discover/tags/computing?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#computing</a> <a href="https://pixelfed.social/discover/tags/cybersecurity?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cybersecurity</a> <a href="https://pixelfed.social/discover/tags/cyberpunk?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cyberpunk</a> <a href="https://pixelfed.social/discover/tags/movies?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#movies</a> <a href="https://pixelfed.social/discover/tags/sudo?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#sudo</a> <a href="https://pixelfed.social/discover/tags/root?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#root</a> <a href="https://pixelfed.social/discover/tags/god?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#god</a> <a href="https://pixelfed.social/discover/tags/cyberspace?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cyberspace</a> <a href="https://pixelfed.social/discover/tags/datasecurity?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#datasecurity</a> <a href="https://pixelfed.social/discover/tags/hacking?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#hacking</a> <a href="https://pixelfed.social/discover/tags/computers?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#computers</a> <a href="https://pixelfed.social/discover/tags/network?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#network</a> <a href="https://pixelfed.social/discover/tags/blackhat?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#blackhat</a> <a href="https://pixelfed.social/discover/tags/whitehat?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#whitehat</a> <a href="https://pixelfed.social/discover/tags/cyberpunkaesthetic?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cyberpunkaesthetic</a> <a href="https://pixelfed.social/discover/tags/computers?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#computers</a> <a href="https://pixelfed.social/discover/tags/filesystem?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#filesystem</a> <a href="https://pixelfed.social/discover/tags/fisherstevens?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#fisherstevens</a> <a href="https://pixelfed.social/discover/tags/pennjillette?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#pennjillette</a>
D_70WN 🌈 🏳️‍⚧️<p>The company was informed by me with a full report and the chance to clean things up, the copied data was deleted and the hard disk was physically destroyed completely by an appropriate service provider. 2/2</p><p><a href="https://chaos.social/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a> <a href="https://chaos.social/tags/digitalforensic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensic</span></a></p>
Wulfy<p>So... Yeah...</p><p>I was today years old when I found out about residential proxies and rotating IP providers...</p><p>Crikey...I think my <a href="https://infosec.exchange/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a> looks a bit gray all of the sudden 😬</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
DrPetz<p>In der Ferienunterkunft ist das Gästenetz nicht vom "Rest" getrennt. Ich kann mich auf den Wechselrichter der Solaranlage mit dem Default-Passwort einloggen und auf meinem Android wird mir die Steuerung des Gastgeber-TV-Gerätes in die Benachrichtigungen gelegt.<br>Die Gastgeber haben absolut keine Ahnung und nur begrenzt Interesse / Verständnis. </p><p>Was würdet ihr tun?</p><p><a href="https://troet.cafe/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a> <a href="https://troet.cafe/tags/keinSchaden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keinSchaden</span></a> <a href="https://troet.cafe/tags/NoHarm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoHarm</span></a></p>
Prof. Dr. Dennis-Kenji Kipker<p>1.000 Gründe für die dringend notwendige <a href="https://chaos.social/tags/Reform" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reform</span></a> vom <a href="https://chaos.social/tags/Computerstrafrecht" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Computerstrafrecht</span></a> - und seit heute wieder einer mehr: So wurde bekannt, dass der "<a href="https://chaos.social/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberangriff</span></a>" auf D-Trust vor Kurzem wohl ein <a href="https://chaos.social/tags/Whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whitehat</span></a> Sicherheitsforscher war, der über eine offene API auf die Daten zugegriffen hat. Aufgrund der rechtlichen Grauzone des "<a href="https://chaos.social/tags/Hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacker</span></a>-Paragraphen" und der von D-Trust erstatteten Strafanzeige habe er sich jedoch nicht an D-Trust, sondern unverzüglich an den <a href="https://chaos.social/tags/CCC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CCC</span></a> gewandt:</p><p><a href="https://www.heise.de/news/D-Trust-Hinter-Angriff-auf-Antragsportal-steckte-wohl-White-Hat-Hacker-10251620.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/D-Trust-Hinter-A</span><span class="invisible">ngriff-auf-Antragsportal-steckte-wohl-White-Hat-Hacker-10251620.html</span></a></p>
Cyber Tips Guide<p>Become an Ethical Hacker: Master coding, network security, and OS knowledge. Pursue degrees and certs like PenTest+, CEH, and OSCP. My article breaks down the path, skills, education, and experience needed. <a href="https://mastodon.social/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a> <a href="https://mastodon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a><br>👉 <a href="https://zurl.co/sOqN" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">zurl.co/sOqN</span><span class="invisible"></span></a></p>
Scripter :verified_flashing:<p>Gesetzentwurf vorgelegt: White-Hat-Hacker sollen künftig straffrei bleiben - Golem.de<br><a href="https://www.golem.de/news/gesetzentwurf-vorgelegt-weisse-hacker-sollen-kuenftig-straffrei-bleiben-2411-190463.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/gesetzentwurf-vo</span><span class="invisible">rgelegt-weisse-hacker-sollen-kuenftig-straffrei-bleiben-2411-190463.html</span></a> <a href="https://social.tchncs.de/tags/WhiteHats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHats</span></a> <a href="https://social.tchncs.de/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a> <a href="https://social.tchncs.de/tags/WhiteHatHacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHatHacker</span></a> <a href="https://social.tchncs.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a></p>
Prof. Dr. Dennis-Kenji Kipker<p>Das Bundesministerium der Justiz (<a href="https://chaos.social/tags/BMJ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BMJ</span></a>) hat nun heute auch den <a href="https://chaos.social/tags/Referentenentwurf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Referentenentwurf</span></a> eines Gesetzes zur Modernisierung vom <a href="https://chaos.social/tags/Computerstrafrecht" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Computerstrafrecht</span></a> veröffentlicht:</p><p>"Ziel dieses Entwurfs ist die klare gesetzliche Abgrenzung von nicht zu missbilligendem Handeln der IT-Sicherheitsforschung von strafwürdigem Verhalten. Der Gesetzentwurf soll die bestehende Rechtsunsicherheit beseitigen." <a href="https://chaos.social/tags/Hackerparagraf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hackerparagraf</span></a> <a href="https://chaos.social/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a></p><p>Zum Download geht es hier: <a href="https://intrapol.org/wp-content/uploads/2024/11/BMJ_Ref-E_ComputerStrafR.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">intrapol.org/wp-content/upload</span><span class="invisible">s/2024/11/BMJ_Ref-E_ComputerStrafR.pdf</span></a></p>
Troed Sångberg<p>This all might improve with CNAs, but I am slightly frustrated with the <a href="https://ioc.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> process through <a href="https://ioc.exchange/tags/Mitre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mitre</span></a> atm. I applied for a CVE number 1 1/2 months ago and got a reply after three weeks stating that the vulnerability did not qualify for a CVE.</p><p>I'm quite sure this was due to a misunderstanding since the application asks us to be brief rather than laying out a lot of details, so I replied with how I do believe it does (basically, they thought the attacker don't have physical access in the normal use case, which they do) and apologized for not having expanded in detail - and did.</p><p>That was two weeks ago. I get having a queue where it can take three weeks for the initial response, but if it's going to be three weeks for every reply in a back'n'forth then there will be no CVE allocated once the 90 day disclosure period is up.</p><p>The vendor? Yeah they acted immediately on the report. But this is a case where I think the vulnerable customers would gain from CVE communication.</p><p><a href="https://ioc.exchange/tags/Whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whitehat</span></a> <a href="https://ioc.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a></p>
Matt Willemsen<p>Hackers return $12 million taken during Ronin network breach<br><a href="https://therecord.media/hackers-return-12-million-taken-from-ronin-network" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/hackers-return</span><span class="invisible">-12-million-taken-from-ronin-network</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://mastodon.social/tags/breach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>breach</span></a> <a href="https://mastodon.social/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a></p>
Carola Sieling<p>Die Strafbarkeit des Hackings – Rechtslage im internationalen Vergleich (DE mit Frankreich, Litauen, Österreich, Niederlanden und Schweden). </p><p>Juristische Bewertung im internationalen Vergleich! </p><p><a href="https://legal.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://legal.social/tags/Whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whitehat</span></a> <a href="https://legal.social/tags/Ethicalhacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ethicalhacker</span></a> <a href="https://legal.social/tags/Strafrecht" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Strafrecht</span></a> </p><p><a href="https://www.bundestag.de/resource/blob/1005444/ed435cb1a5311bb688385a81f295c8a3/WD-7-104-23-pdf.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bundestag.de/resource/blob/100</span><span class="invisible">5444/ed435cb1a5311bb688385a81f295c8a3/WD-7-104-23-pdf.pdf</span></a></p>
gtbarry<p>The founder of the spyware app pcTattletale said his company is “out of business and completely done” following a data breach over the weekend.</p><p>The shutdown comes days after a hacker defaced the spyware maker’s website and published links containing large amounts of data from pcTattletale’s servers, including databases of customers’ information and some victims’ stolen data.</p><p><a href="https://mastodon.social/tags/pcTattletale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcTattletale</span></a> <a href="https://mastodon.social/tags/stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalkerware</span></a> <a href="https://mastodon.social/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> <a href="https://mastodon.social/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.social/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a> <a href="https://mastodon.social/tags/hacked" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacked</span></a></p><p><a href="https://techcrunch.com/2024/05/28/pctattletale-spyware-shutters-data-breach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/05/28/pcta</span><span class="invisible">ttletale-spyware-shutters-data-breach/</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@tinker" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tinker</span></a></span> <em>precisely</em></p><ul><li><p><a href="https://infosec.space/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a>: <em>refuses to violate laws out of principle, even if that means being unethical</em></p></li><li><p><a href="https://infosec.space/tags/GreyHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreyHat</span></a>: <em>refuses to violate good principles out of moral obligation and ethics, even if that means they'd violate laws</em></p></li><li><p><a href="https://infosec.space/tags/BlackHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat</span></a>: <em>doesn't give a damn and is only interested in personal profit if not maximizing damage to others</em></p></li></ul>
Prof. Dr. Dennis-Kenji Kipker<p>Das deutsche Computerstrafrecht ist leider total überholt und passt nicht mehr zur Cybersecurity-Realität! Was sich jetzt dringend ändern muss, darüber schreiben Sebastian Rockstroh und ich in der kommenden Ausgabe der Zeitschrift für Informationssicherheit "kes". <a href="https://chaos.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://chaos.social/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a></p>
WeAreTheOil<p>Мониторинг Postgresql <a href="https://liberdon.com/tags/blackhat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blackhat</span></a></p><p>Monitoring Postgresql <a href="https://liberdon.com/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a></p>