shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

284
active users

#tenable

0 posts0 participants0 posts today
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> list of resources for week #11/2025 is out!</p><p>It includes the following and much more:</p><p>➝ Alleged Co-Founder of <a href="https://infosec.exchange/tags/Garantex" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Garantex</span></a> Arrested in India;</p><p>➝ X Suffered a <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> Attack;</p><p>➝ Microsoft <a href="https://infosec.exchange/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PatchTuesday</span></a> Fixes 7 Zero-days;</p><p>➝ UK Hospital Discovered 5,000 to 10,000 Unknown Devices Connected to its Network;</p><p>➝ <a href="https://infosec.exchange/tags/NVIDIA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NVIDIA</span></a> Chips Smugglers Granted Bail in Singapore;</p><p>➝ <a href="https://infosec.exchange/tags/Tenable" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tenable</span></a> tested <a href="https://infosec.exchange/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepSeek</span></a>'s Ability to Generate <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>;</p><p>➝ <a href="https://infosec.exchange/tags/OpenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenAI</span></a> labelling DeepSeek as "state-controlled";</p><p>➝ New <a href="https://infosec.exchange/tags/Jailbreak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jailbreak</span></a> Method called Context Compliance Attack (CCA) Works Against Most <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> Models</p><p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/template-infosec-mashup-xx-2025-7eb9e43f2aebd47f?utm_source=beehiiv&amp;utm_medium=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/template-infosec-mashup-xx-2025-7eb9e43f2aebd47f?utm_source=beehiiv&amp;utm_medium=mastodon</span></a></p>
The Cybersecurity Librarian :donor:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@cR0w" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cR0w</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@mttaggart" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mttaggart</span></a></span> Another good approach, if you have Tenable.sc or Tenable.io is to uses Plugin ID 136618 which inventories all <a href="https://infosec.exchange/tags/vscode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vscode</span></a> extensions. You can then look for the "long tail" to find suspicious extensions or legitimate services that use tunnels. (vscode server).</p><p>I've seen recipes to use a powershell command to get a list of extensions, but if your vuln scanner already does it... win.</p><p><a href="https://infosec.exchange/tags/tenable" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tenable</span></a></p>
deltatux :donor:<p><span>So </span><a href="https://infosec.town/tags/Microsoft" rel="nofollow noopener noreferrer" target="_blank">#Microsoft</a><span> could have fixed the </span><a href="https://infosec.town/tags/Azure" rel="nofollow noopener noreferrer" target="_blank">#Azure</a><span> flaw faster, but if it wasn't for </span><a href="https://infosec.town/tags/Tenable" rel="nofollow noopener noreferrer" target="_blank">#Tenable</a><span>'s CEO blasting the company, they would have sat on it until September? Seriously, wtf?<br><br></span><a href="https://infosec.town/tags/infosec" rel="nofollow noopener noreferrer" target="_blank">#infosec</a><span> </span><a href="https://infosec.town/tags/cybersecurity" rel="nofollow noopener noreferrer" target="_blank">#cybersecurity</a><span> </span><a href="https://infosec.town/tags/cloudsecurity" rel="nofollow noopener noreferrer" target="_blank">#cloudsecurity</a><span><br><br></span><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-flaw-after-being-called-irresponsible-by-tenable-ceo/" rel="nofollow noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-flaw-after-being-called-irresponsible-by-tenable-ceo/</a></p>