mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.7K
active users

#elevationofprivilege

0 posts0 participants0 posts today
Brandon H :csharp: :verified:<p>via <span class="h-card" translate="no"><a href="https://dotnet.social/@dotnet" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dotnet</span></a></span> : .NET and .NET Framework January 2025 servicing releases updates</p><p><a href="https://ift.tt/eR6NaGf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">ift.tt/eR6NaGf</span><span class="invisible"></span></a><br><a href="https://hachyderm.io/tags/DotNet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DotNet</span></a> <a href="https://hachyderm.io/tags/DotNetFramework" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DotNetFramework</span></a> <a href="https://hachyderm.io/tags/January2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>January2025</span></a> <a href="https://hachyderm.io/tags/SecurityUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityUpdates</span></a> <a href="https://hachyderm.io/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://hachyderm.io/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://hachyderm.io/tags/DenialOfService" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DenialOfService</span></a> <a href="https://hachyderm.io/tags/ElevationOfPrivilege" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElevationOfPrivilege</span></a> <a href="https://hachyderm.io/tags/ASPNetCore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ASPNetCore</span></a> <a href="https://hachyderm.io/tags/EFCore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EFCore</span></a> <a href="https://hachyderm.io/tags/ReleaseNotes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReleaseNotes</span></a> <a href="https://hachyderm.io/tags/Softwa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Softwa</span></a>…</p>
Claudius Link<p>The Canadian Centre for Cyber Security has an interesting article on <a href="https://infosec.exchange/tags/CybeSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybeSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatActors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatActors</span></a> (adversaries) and their motivation.</p><p><a href="https://www.cyber.gc.ca/en/guidance/introduction-cyber-threat-environment" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cyber.gc.ca/en/guidance/introd</span><span class="invisible">uction-cyber-threat-environment</span></a></p><p>The article IMHO leaves out at some threat actors (which might not be that relevant for a commercial or critical infrastructure setting)</p><ul><li>Abusive Partners</li><li>Stalkers</li><li>Kids</li></ul><p>while these could be seen as part of insider threats, I believe that their capabilities and opportunities are different from other insiders. <br>And they are often overlooked when developing consumer products.<br>Think of the problems with <a href="https://infosec.exchange/tags/AirTags" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AirTags</span></a> or the bike theft "problem" with Strava.</p><p>I really like this and are thinking of creating a game around it to raise security awareness (especially within development and designe of systems). <a href="https://infosec.exchange/tags/SeriousGames" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SeriousGames</span></a></p><p>Idea is to have a collaborative game where you play through threats against your system. Starting with the Threat Actors, their intend, capabilities and opportunities.<br>Going through techniques used (maybe using a subset of <a href="https://infosec.exchange/tags/MitreAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MitreAttack</span></a> but also common <a href="https://infosec.exchange/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialEngineering</span></a> techniques).<br>And then choosing mitigation and defense options.</p><p>A bit of a mixture between <a href="https://infosec.exchange/tags/ElevationOfPrivilege" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElevationOfPrivilege</span></a>/#EoP, <a href="https://infosec.exchange/tags/BackdoorsAndBreaches" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BackdoorsAndBreaches</span></a> and <a href="https://infosec.exchange/tags/FearlessJourney" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FearlessJourney</span></a></p>
ITSEC News<p>Microsoft patches four zero-days, finally takes action against crimeware kernel drivers - Here's a brief reminder to do two things. The first is to patch. The second is to read up... <a href="https://nakedsecurity.sophos.com/2023/07/12/microsoft-patches-four-zero-days-finally-takes-action-against-crimeware-kernel-drivers/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nakedsecurity.sophos.com/2023/</span><span class="invisible">07/12/microsoft-patches-four-zero-days-finally-takes-action-against-crimeware-kernel-drivers/</span></a> <a href="https://schleuss.online/tags/elevationofprivilege" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>elevationofprivilege</span></a> <a href="https://schleuss.online/tags/securitybypass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securitybypass</span></a> <a href="https://schleuss.online/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://schleuss.online/tags/patchtuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>patchtuesday</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://schleuss.online/tags/eop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eop</span></a></p>