shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

271
active users

#infosec

105 posts93 participants14 posts today
AAKL<p>PSA: Huntress has some cybersecurity openings: <a href="https://job-boards.greenhouse.io/huntress" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">job-boards.greenhouse.io/huntr</span><span class="invisible">ess</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@huntress" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>huntress</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
AAKL<p>CSO: 5 hard truths of a career in cybersecurity — and how to navigate them <a href="https://www.csoonline.com/article/4026880/5-hard-truths-of-a-career-in-cybersecurity-and-how-to-navigate-them.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">csoonline.com/article/4026880/</span><span class="invisible">5-hard-truths-of-a-career-in-cybersecurity-and-how-to-navigate-them.html</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Nicolas Ward :dogcow:<p>drawafish.com security incident postmortem <a href="https://aldenhallak.com/blog/posts/draw-a-fish-postmortem.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aldenhallak.com/blog/posts/dra</span><span class="invisible">w-a-fish-postmortem.html</span></a> <a href="https://tacobelllabs.net/tags/vibecoding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vibecoding</span></a> <a href="https://tacobelllabs.net/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>

Promises, promises.

Exclusive: Brosix and Chatox promised to keep your chats secured. They didn’t.

A researcher found a misconfigured backup with -- yes, you guessed it -- everything in plaintext instead of encrypted.

Some entities that used the service are medical entities that were actually mentioning protected health information or attaching files with #PHI in the chat.

There were almost 5k Allstate employees using the service and sharing customer #PII in files.

And oh yeah, I found one company gossiping about me and plotting against me after I notified them they were leaking tons of #PHI. I've done them a favor by not publishing all their chat logs about me. :)

There also appeared to be some "dodgy" stuff on the backup, too.

Read the details about the exposed backup in my post at databreaches.net/2025/08/05/ex

#infosec #encryption #databreach #incidentresponse #chatox #brosix #dataleak

@zackwhittaker

This seems like a bit of a flaw:

spammyshit@gmail.com sends me an email with a calendar event in it.

gmail reads email for me, puts the email in the spam folder, then adds calendar event to my calender.

I delete the calendar event.

The calender sends an email to spammyshit@gmail.com from my email address saying I will not be attending.

🔍 When #Democracy Meets Data Exploitation: An ITSPmagazine's #BlackHat USA 2025 Pre-Event Coverage Conversation!

How vulnerable is your personal information when you engage with political campaigns? Virginia Tech researchers Alan Michaels and Jared Byers spent five years finding out—and their discoveries should concern every citizen who values #privacy.

🎙️ In this pre-event coverage from Black Hat USA 2025, Sean Martin, CISSP and I explore groundbreaking research that exposes the hidden data economy behind political engagement. Using thousands of fake digital identities across 1,400 real campaigns, this study reveals how personal information flows through political networks—often without your knowledge or consent.

Key revelations include:
Cross-party data sharing that transcends political boundaries
AI-powered persona creation for targeted manipulation
Security vulnerabilities exposing citizen data
The real cost of political participation in the digital age

This isn't about politics—it's about the intersection of #technology, #society, and fundamental privacy rights. As our democratic processes become increasingly digitized, understanding these data practices becomes essential for every citizen.

The research maintains strict political neutrality, letting the data expose uncomfortable truths about how campaigns treat personal information regardless of party affiliation.

📺 Watch: lnkd.in/emYyif2D 🎧 Listen: lnkd.in/efj8F5VE 🎪 Full Black Hat Coverage:lnkd.in/gQ4-g3Ab

What questions would you ask about political data practices? The implications extend far beyond campaign season.

lnkd.inLinkedInThis link will take you to a page that’s not on LinkedIn
Continued thread

I’m sorry, you’re right. You’ve checked that it was me four times in two minutes, but the fifth time in the same process flow on the same machine from the same IP address it might totally be a hacker, so you better make sure. #infosec 🙄

📢 OWASP Ottawa August 2025 Meetup 📢

OWASP Ottawa is back from our summer break! Join us in person at the University of Ottawa for our next OWASP Ottawa meetup on August 20, 2025, where we’ll dive into not one, but two timely and impactful talks at the intersection of cybersecurity, AI, and real-world application security.

📅 Date: August 20, 2025
⏰ Time: 6:00 PM EST – Arrival, setup & pizza 🍕
6:30 PM EST – Technical Talks
📍 Location: 150 Louis-Pasteur Private, University of Ottawa, Room 117

🎙️ Talk 1: "Doing More with Less: An Adaptive, Label-Efficient Approach to Fraud Detection from Day One" with Bahar Afshar
👥 Speaker: Bahar Afshar, Master’s in Computer Science candidate with specialization in AI at University of Ottawa
Discover an innovative approach on how to detect financial fraud using adaptive, label-efficient AI approaches, even when labeled, fraudulent data is scarce. A must-see for those in finance, security, and AI research.

🎙️ Talk 2: "Beyond APIs: MCP Security for AI Integrations" with Harsh Makwana
👥 Speaker: Harsh Makwana, M.Eng, Aplication Security Consultant at Software Secured
Model Context Protocol (MCP) is becoming the standard for LLM integration with external tools, but this increasingly fast adoption rate is coming at the cost of missed security challenges. Learn the security strategies necessary to build hardened AI agents.

📺 Can’t join in person? We’ll livestream on YouTube on our channel: youtube.com/@OWASP_Ottawa

🔗 RSVP now: meetup.com/owasp-ottawa/events

Come learn, network, and grab some pizza 🍕 with Ottawa’s cybersecurity community!
.
.
.
.
.
.
.
.
#OWASP #Ottawa #Cybersecurity #InfoSec #Networking #AI #AISecurity #FraudDetection #MachineLearning