Incredible talks so far at the Hybrid Identity Protection Conference. Glad I’m getting the chance to attend. #hipconf
07.10.2025 23:39 — 👍 0 🔁 0 💬 0 📌 0@nateahess.bsky.social
Information Security Analyst | Identity • Cloud Security | Dad https://nateahess.medium.com/ https://github.com/nateahess
Incredible talks so far at the Hybrid Identity Protection Conference. Glad I’m getting the chance to attend. #hipconf
07.10.2025 23:39 — 👍 0 🔁 0 💬 0 📌 0Shoutout to @trustedsec.com for the free shirt! 🤙 love it!
21.08.2025 17:48 — 👍 2 🔁 0 💬 1 📌 0Same! We always guess which one we’re going to get and see who wins.
21.08.2025 00:52 — 👍 2 🔁 0 💬 1 📌 0I drove to Orlando a few days ago from about the same distance and listened to my son sing that the whole way anyways, …so yes, definitely.
06.08.2025 01:45 — 👍 1 🔁 0 💬 0 📌 0Well this isn’t going as expected #f1
02.08.2025 13:01 — 👍 0 🔁 0 💬 0 📌 0Time to see how this weekend goes. #f1
01.08.2025 14:10 — 👍 1 🔁 0 💬 0 📌 1Hackers
31.07.2025 19:24 — 👍 1 🔁 0 💬 0 📌 017K+ SharePoint Servers Exposed to Internet – 840 Servers Vulnerable to 0-Day Attacks
31.07.2025 15:48 — 👍 0 🔁 1 💬 0 📌 0A vulnerability in Google's Gemini CLI allowed attackers to silently execute malicious commands and exfiltrate data from developers' computers using allowlisted programs.
28.07.2025 15:41 — 👍 11 🔁 5 💬 0 📌 1Mandating that orgs declare to Gov they paid a ransom isn’t the silver bullet some paint it as. Loopholes will be found or worse it will make paying potentially more socially acceptable. Governments are avoiding tackling the hard issues imo - one of those is more transparency in the crypto space.
22.07.2025 08:39 — 👍 24 🔁 1 💬 2 📌 0Always check your sources. The recently registered putty[.]network drops a botnet/c2.
app.any.run/tasks/8d1d72...
AI Creates Realistic Honeypots for Cybersecurity | EdTech Magazine edtechmagazine.com/higher/artic...
12.07.2025 10:38 — 👍 1 🔁 1 💬 0 📌 0Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
26.06.2025 08:10 — 👍 0 🔁 1 💬 0 📌 0More than 16 billion login credentials for Google, Facebook, Apple and other platforms have been exposed in one of the largest databases of cybersecurity breaches of all time, according to a Cybernews report.
www.axios.com/2025/06/20/d...
#CanadianGP 🇨🇦 Moments!!
#formula1 #f12025
VIA: [F1]
Yelp was way ahead of Apple on this new design language. #liquidglass
18.06.2025 21:28 — 👍 0 🔁 0 💬 0 📌 0Excitement in my 30’s is opening the dishwasher and realizing it hasn’t been ran yet, so I can add to it without emptying it first.
01.06.2025 02:06 — 👍 0 🔁 0 💬 0 📌 0If your article starts with something like “in today’s fast growing technological landscape” then I’m skipping it.
27.05.2025 02:13 — 👍 0 🔁 0 💬 0 📌 0Chart showing the Top dual-use tools observed in all incidents by frequency for the year 2024.
Security Firm @SophosXOps published another report, this one on incidents at small and medium-sized businesses by @thepacketrat and Anna Szalay. One of the things I always look for in these reports are easy #cybersecurity wins -- and this report has a bunch […]
[Original post on infosec.exchange]
It’s not snow unless it sticks
07.04.2025 16:50 — 👍 13 🔁 2 💬 1 📌 0His AI posts sound like paid scaremongering ads.
17.02.2025 19:18 — 👍 0 🔁 0 💬 0 📌 0This also has my vote. Feels like this graphic conveys a HomePod/hub device with a display.
16.02.2025 03:45 — 👍 1 🔁 0 💬 0 📌 0I’m learning that a cybersecurity Masters degree is just the daily research I do for my job, but now I’m putting it in APA format and expanding it to 10-15 pages.
15.02.2025 20:56 — 👍 2 🔁 0 💬 0 📌 0Beyond this, they provide services like attack surface management and penetration testing for smaller critical infrastructure orgs that might not be able to afford enterprise level solutions. They’re way too important to be making cuts.
11.02.2025 15:20 — 👍 1 🔁 0 💬 1 📌 0Interesting take. Should probably say “don’t use your email as your 2FA method” instead.
apple.news/APSL1kjBETSW...