Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“DevSecOps: More Than Just Pipelines” https://twp.ai/4ioDxP
Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“DevSecOps: More Than Just Pipelines” https://twp.ai/4ioDxP
Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“Security Metrics that Matter” https://twp.ai/4ioGd3
@Kitty It makes sense to try phishing attacks on Mastodon users. But, apart from "account verification does not exist as a concept here", are there any other indices to spot to detect such scams? What should users generally beware of to not fall for phishing attacks here?
/cc @ela & @quintessence ^^?
Frage an die weiblichen Nerds:
Ich hab zwei tolle Töchter (7 & 9) – und will ihnen zeigen, wie spannend Informatik sein kann.
Nicht mit „Schminkspielen“, sondern mit echtem Nerd-Fun: Logik, Kreativität, Code, Privacy, Security.
Open Source statt Paywall. Verständnis statt Konsum.
Was hat euch damals fasziniert?
Habt ihr Empfehlungen für freie Tools, Projekte oder Bücher, die Kids empowern – mit Fokus auf Technik, Datenschutz und digitale Selbstbestimmung?
Danke euch schon jetzt!
Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“DevSecOps: More Than Just Pipelines” https://twp.ai/4ioig2
Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“Top Ten Security Tips for APIs” https://twp.ai/4ioX6N
Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“Shifting Security Everywhere” - Not just LEFT anymore! https://twp.ai/4ioasq
Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“XSS Deep Dive” https://twp.ai/4in9ro
Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“Security is Everybody’s Job” https://twp.ai/4in9rk
Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“Security Learns to Sprint” https://twp.ai/4in9ri
Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“Top Ten Security Tips for APIs” https://twp.ai/4in9ou
Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“Incident Response for Devs” - And #DevOps folks too! https://twp.ai/4in9ow
OWASP Ottawa June 2025 Meetup
Join us in person at the University of Ottawa for our next OWASP Ottawa meetup on June 18, 2025, as we explore the human side of cybersecurity.
Date: June 18, 2025
Time: 6:00 PM EST – Arrival, setup & pizza
6:30 PM EST – Technical Talks Location: 150 Louis-Pasteur Private, University of Ottawa, Room 117
Talk: “Hacking the Human Firewall: Insights from Social Engineering Corporations”
Speakers: Kyle Falcon, PhD, Ahmed Shah, Mathieu Quirion, and Kevin Tremblay – Security & GRC Analysts at Malleum
Despite all the advanced tech, humans remain the weakest link in cybersecurity. This talk will dive into real-world social engineering campaigns and will discuss:
• OSINT - Determining Targets and Entry Points
• NIST Phish Scale - Evaluating the Content of a Phishing Email
• Email Phishing - How Attackers Get SPAM Into the Corporate Inbox
• Phone Social Engineering - Experiences in Impersonation and Taking Over Accounts
• Physical Security - Outcomes from Just Hanging Around the Office
You'll leave with:
• A deeper understanding of attacker psychology & methods
• Practical tips to strengthen your organization’s human defenses
Can’t join in person? We’ll livestream on YouTube: https://www.youtube.com/@OWASP_Ottawa
RSVP now: https://www.meetup.com/owasp-ottawa/events/308219237/
Come learn, network, and grab some pizza with Ottawa’s cybersecurity community!
Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
"Shift Left Doesn't Mean Anything Anymore" https://twp.ai/4in9oU
@dalai @ip6li wenn das kein unangekündigtes "#SecurityAwareness"-#Training ist bin ich erschrocken.
Allein die Nutzung von #Govware wie #Outlook welche #Passwörter (und generell Logins zu Postfächerm) im #Klartext an #Microsoft schickt sollte Grund genug sein diesen wegen gröblicher Pflichtverletzung zu feuern und in Regress zu nehmen!
Why Take9 Won’t Improve Cybersecurity
There’s a new cybersecurity awareness campaign: Take9. The idea is that people—you, me, everyone—should just pause for nine seconds and think more about the link they are planning to click on, the file they are planning to downlo... https://www.schneier.com/blog/archives/2025/05/why-take9-wont-improve-cybersecurity.html
Practical steps for secure and ethical #AI use by educators and researchers by Marlon Domingus (Erasmus University Rotterdam):
𝗩𝗲𝗿𝗶𝗳𝘆 𝗔𝗜-𝗴𝗲𝗻𝗲𝗿𝗮𝘁𝗲𝗱 𝗶𝗻𝘀𝗶𝗴𝗵𝘁𝘀
Don’t blindly trust AI outputs — always verify sources and context. “In science, it is usual to, in principle, challenge every truth claim, to test its validity. With the growing societal impact of AI, this should also become common-sense practice for daily life.”
What does secure and ethical use of #AI look like in practice in #HigherEducation and #research?
Marlon Domingus, DPO and AI lead at Erasmus University Rotterdam, shared with us some practical steps to protect data, systems, and core ethical principles for educators and researchers looking to integrate AI into their work: https://connect.geant.org/2024/10/24/practical-steps-for-secure-and-ethical-ai-use-by-educators-and-researchers
What does your password manager set up look like?
@sans_isc : even if https://i5c.us does *not* appear to be a regular URL-shortening service, nothing in it's domain name convinces me it's not. Perhaps they're offering *you* a free service that *visitors* pay for with a loss of privacy.
I do not want to, and simply cannot (I apologize for my intelligence not being artificial) remember all possible aliases of https://isc.sans.edu - in order to prevent from being fooled or phished.
Why is this not as stupid as Microsoft (microsoft.com) asking their customers to log in to:
login.microsoftonline.com
instead of somehing like:
login.customer.microsoft.com
Mastodon has its own, IMO excellent built-in URL-shortening system for the final link you asked us to visit:
https://isc.sans.edu/diary/31136
In fact, the full link to that article is automatically shortened by Mastodon fine too:
https://isc.sans.edu/diary/Tracking%20Proxy%20Scans%20with%20IPv4.Games/31136
I juste posted additional reasons in a toot to Margarita Estévez-Abe in https://infosec.exchange/@ErikvanStraten/112887650119094186.
Let's all do our best to make the internet a safer place!