shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

281
active users

#soc

2 posts2 participants0 posts today
Replied in thread

@cas @wolf480pl granted, the distain is mutual, given almost all #SBC & #SoC vendors refuse to do basic #documentation on how their shit works and barely release some dodgy images with custom kernel modules.

#Apple's Hardware does have @AsahiLinux as project to care for and is popular enough to be worth the hassle for them, as it brings decent performance and battery runtime to the table...

🥷 Calling all Kunai Ninjas! 🥷

We're happy to announce the launch of the Kunai Community Hub – a collaborative space where you can share your architecture overviews, deployment tips, and any other useful information about Kunai.

Why Join the Kunai Community Hub?

- Share Your Expertise: Contribute your knowledge and experiences to help others in the community.
- Learn from Others: Discover best practices, architectural insights, and deployment strategies from fellow Kunai users.
- Connect and Collaborate: Engage with the community of Kunai users.

Join the Conversation:

We can't wait to see what you share! Whether it's a detailed architecture overview, deployment tips, or insights on scaling, your contributions will help build a stronger and more knowledgeable Kunai community.

Get Started:

Visit the Kunai Community Hub on GitHub: github.com/kunai-project/commu

#OpenSource #Linux #Malware #ThreatHunting #DFIR #SOC #DetectionEngineering

Thank you for being part of the Kunai journey!

Kunai Community Hub. Contribute to kunai-project/community-hub development by creating an account on GitHub.
GitHubGitHub - kunai-project/community-hub: Kunai Community HubKunai Community Hub. Contribute to kunai-project/community-hub development by creating an account on GitHub.
Replied in thread

@k4m1 @stman yeah, according to the #RTL8139 #datasheet this is basically a very cheap 10/100M NIC designed #embedded systems and low-end/low-cost desktops, and for a device designed and sold in 2006 it made sense, given back then #Gigabit-#Ethernet and Cat.5 cabling was considered high-end.

  • And unlike contemporary / successor chips by #Intel like the famous #i210 (which is still offered as #i219 but mostly succeeded by the #i225 as a 2,5GBase-T version) is way cheaper, which pre-#RoHS - NICs being sold for like € 10 retail & brand-new....

The few issues known only affect like #Virtualization setups, a market this thing was never designed for (most likely also never tested against).

  • I'd not he surprised if a lot of cheap #ThinClients and other systems used these NICs because of the simplicity of integration, being a cheap 3,3V single-chip (+auxilliary electronics) solution and propably costling less than 10¢ on a reel of 10.000.

It's the reason why to this day we see #Realtek NICs being shipped instead of fanning-out & enabling #SoC-integrated NICs with a #MAC & #PHY instead: Because the auxilliary parts for those are more expensive than just getting a PCI(e lane) somewhere and plonking it down.

  • Maybe there have even been some really cheap, low-end #Routers / #Firewalls aiming at #SoHo customers back in those days, cuz back then 16MBit/s #ADSL2 was considered fast, and Realtek's NICs up until recently only delivered like 60-75% of the max. speed advertised, so by the time someone would notice, that gearvwould've been EoL'd anyway and those who did notice right-away never were the target audience to begin with.

Most modern NICs are more complex and demand more configuration / driver support...

This NLRB whistleblower complaint is a horror story for any CERT team. As a CTI/SOC analyst, if I see spawned powershell invoking web requests to some random-ass AI API reverse-engineering tool/headless browser repository, large outbound byte transfers measured in GBs, or conditional access policies/MFA being tampered with, you’re getting isolated and we’re standing up an incident response bridge. Also, someone on your team has an info stealer on their device if they’re seeing attempted logins from a foreign country within fifteen minutes of account creation.

This is an insider threat case of the worst kind: one your security team gets to watch but can’t do a damn thing to stop.

arstechnica.com/tech-policy/20

whistlebloweraid.org/wp-conten

Looking forward to learning more about this libre-licensed RISC-V SoC with Kazan GPU and VPU.

crowdsupply.com/libre-risc-v/m

I'm really curious how these types of chips are prototyped. I know we can simulate a few hundred thousand logical operations with an FPGA, but is that even close to simulating a powerful chip of this size?

Crowd SupplyLibre RISC-V M-ClassA 100% libre RISC-V + 3D GPU chip for mobile devices
#riscv#soc#libre

2025-03-28 RDP #Honeypot IOCs - 181569 scans
Thread with top 3 features in each category and links to the full dataset
#DFIR #InfoSec

Top IPs:
138.199.24.6 - 91545
156.146.57.110 - 42849
156.146.57.52 - 10716

Top ASNs:
AS60068 - 93561
AS212238 - 64269
AS135161 - 10653

Top Accounts:
hello - 181455
Test - 33
eltons - 15

Top ISPs:
DataCamp Limited - 93561
Datacamp Limited - 64269
GMO-Z.COM PTE. LTD. - 10653

Top Clients:
Unknown - 181569

Top Software:
Unknown - 181569

Top Keyboards:
Unknown - 181569

Top IP Classification:
hosting & proxy - 160374
hosting - 10710
Unknown - 10440

Pastebin links with full 24-hr RDP Honeypot IOC Lists:
pastebin.com/BiF6s8Jh

Pastebin2025-03-28_stats.json - Pastebin.comPastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.

🎯 Free Cybersecurity Webcasts from SANS — Now Open for Registration!

SANS Institute has released its latest schedule of free, expert-led webcasts throughout 2025. Topics span the most critical areas of cybersecurity today:

🔹 Microsoft Defender for Cloud – Best practices & insights
🔹 ICS Security & Management of Change – Resilience and risk
🔹 Threat Intelligence & SOC Trends – Based on global survey data
🔹 Multicloud & GenAI Security – How organizations are adapting
🔹 Attack Surface Management – Stay ahead of hacker tactics

📅 Flexible live or on-demand viewing
🏆 Earn CPE credits
💡 Stay current on the latest in cyber

This is a great opportunity for pros at all levels to grow their skills and stay sharp in a fast-evolving field.

#CyberSecurity #SANS #ProfessionalDevelopment #FreeTraining #ThreatIntel #SOC #CloudSecurity
@sans_isc
@sans_isc@mastodon.social

view.email.sans.org/?qs=69e042

🚨 ALERT: Banking Apps Under Attack: Credentials Hijacked via Telegram
⚠️ A #malware dropper delivers a stealer disguised as the IndusInd Bank app. It embeds a phishing website inside the Android app to steal victims’ financial data, posing a threat to mobile banking users and financial institutions.

🔍 Analysis: app.any.run/tasks/fe800ccb-fcc

The malware tricks users into entering their sensitive information (registered mobile number, Aadhaar number, PAN card, net banking user ID, etc.) through a fake banking interface embedded in the app.

📥 Once submitted, the stolen data is sent to both the #phishing site and a C2 server controlled via Telegram.

The AndroidManifest.xml shows that the dropper APK has permissions to install applications. The #dropper contains base.apk, the malicious #payload, and is responsible for dropping and executing it.

👨‍💻 Our new #Android sandbox allows #SOC teams reveal base.apk behavior: communication via Telegram, starting from another location, monitoring incoming messages, and more. Fast access to threat details enables deep analysis and proactive response, mitigating potential damage.

The APK is obfuscated, with all strings #XOR-encrypted with the ‘npmanager’ key. The CyberChef recipe below reveals the script that sends intercepted data to Telegram: gchq.github.io/CyberChef/#reci

#IOCs:
#Phish URL: hxxps://t15[.]muletipushpa[.]cloud/page/
C2 Server (Telegram Bot): hxxps://api[.]telegram[.]org/bot7931012454:AAGdsBp3w5fSE9PxdrwNUopr3SU86mFQieE

More IOCs and insights will be shared in our blog post. Let us know if you're interested! 💬

🚀 Expose Android threats in seconds with real-time APK analysis in #ANYRUN Sandbox: app.any.run/?utm_source=mastod

Wow, talk about not understanding the assignment.
Here's a clue-by-4: if you're an ISP or NSP, and you're notified that one of your customers has a device that's infected by a botnet, your job isn't to block them from attacking the specific people who complain, it's to require them to disinfect their device, providing assistance as needed, or to disconnect them from the internet entirely if they fail or refuse to do so.
#infosec #botnet #BlueTeam #SOC

#tryHackMe has a new certification out, the Security Analyst Level 1 or #SAL1 for short. I will NOT be covering it on my channel to assess its #accessibility for #screenReader users, because in a sense I already have. I did a stream on their #SOC simulator recently which is a big part of this cert, and that was a disaster. Add to that that on the "About' page, they couldn't even be bothered to #altText the one logo in the descriptive text makes me feel it is utterly unnecessary to even give this a chance. It's a #fail. plain and simple.