hey community! this looks amazing!

FITS 2025
Feminist IT 2 the Sky

A whole day of feminist engagement with diverse IT topics, for FLINTA* folks, taking place at the TU Wien, on Saturday 27th September 2025.

The registration form will be linked here https://fits.diebin.at/ some time in the second half of August.

#wien #flinta* #IT #Coding #SoftwareDevelopment #Linux & #OpenSource #EthicalHacking

congrats to the ppl at @diebin

FITS 2025 - Feminist IT 2 the Sky!

A whole day of feminist engagement with some IT topics, for women and non-binary folks, taking place at the TU Wien, on Saturday 27th September 2025.

⚫🔵🟢 Introducción a los Sistemas Operativos 💻🖥️
"Los sistemas operativos son el corazón de cualquier computadora. Desde Windows hasta Linux, cada uno tiene sus propias ventajas y desventajas. ¿Cuál prefieres y por qué?" 🪟🐧

#SistemasYRedes #RedesDeComputadoras #AdministraciónDeRedes #DesarrolloWeb #FrontEnd #BackEnd #FullStack #Ciberseguridad #SeguridadInformática #Hacking #EthicalHacking #Tech #Technology #IT #Innovation

BLUE TIC 🌐💻

Sistemas y Redes 🖥️ | Desarrollo Web 🌐 | Ciberseguridad 🔒

Somos una empresa joven dedicada al sector de la Tecnología de la Información y Comunicación (TIC) enfocados en la seguridad y privacidad de la TIC.

Sitio Web: https://blueticgroup.wordpress.com

#SistemasYRedes #RedesDeComputadoras #AdministraciónDeRedes #DesarrolloWeb #FrontEnd #BackEnd #FullStack #Ciberseguridad #SeguridadInformática #Hacking #EthicalHacking #Tech #Technology #IT #Innovation

Hackers Hijacked Google’s Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home

For likely the first time ever, security researchers have shown how AI can be hacked to create real world havoc, allowing them to turn off lights, open smart shutters, and more.

WIRED

One of the talks you can’t miss at #OrangeCon2025: KPN ethical hackers Sebastiaan Groot & Frank Cozijnsen reveal how they discovered a remote code execution (RCE) vulnerability in a standard Steering of Roaming system and how they creatively turned it into two-way communication across networks.

Check out the full schedule and get your tickets: orangecon.nl/#schedule

#OrangeCon2025 #Cybersecurity #TelecomSecurity #RCE #EthicalHacking

Recon Methodology: JavaScript File Hunting

Bounty Hunting Through JS files

Medium
Web Application Security Testing with Wfuzz - DenizHalil - Professional Cybersecurity Consulting and Penetration Testing

We offer expert cybersecurity, artificial intelligence and technology consultancy to ensure the digital security of your business. Ensure your business continuity with proactive solutions, risk analysis and effective intervention strategies against current threats. Increase your competitive advantage in the digital world with our reliable, innovative and business-oriented services.

DenizHalil - Professional Cybersecurity Consulting and Penetration Testing
I’m a cybersecurity CEO who advises over 9,000 agencies and Sam Altman is wrong that the AI fraud crisis is coming—it’s already here

We may soon recognize a "Moore's Law"-style principle for AI that I call “Altman’s Law”: every 180 days, AI capabilities double.

Fortune

Comprehensive List of Top 10 Uses for #VPS Servers If you've ever wondered, "what are common use-cases for VPS servers?", you have come to the right place!

We have compiled a list of the top 10 uses for VPS servers, as observed by Rad Web Hosting staff, during the course of providing VPS hosting services since 2015.

It should be noted that this compilation is not ...
Continued 👉 https://blog.radwebhosting.com/top-10-uses-for-vps-servers/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.raddemo.host #scalability #gameservers #cloudstorage #vpsservers #vpnhosting #backup #ethicalhacking

Comprehensive List Of Top 10 Uses For VPS Servers - VPS Hosting Blog | Dedicated Servers | Reseller Hosting

Top 10 Uses for VPS Servers: If you've ever wondered, "what are common use-cases for VPS servers?", you have come to the right place!

RadWeb, LLC

Ethical hackers 'Saber' and 'cyb0rg' just pulled back the curtain on North Korea’s notorious Kimsuky group—exposing deep vulnerabilities in state-sponsored cyber ops. Could this shift the balance in the cyber war game? Find out more.

https://thedefendopsdiaries.com/the-ethical-hackers-who-exposed-north-korean-cyber-operations/

#ethicalhacking
#northkorea
#cybersecurity
#kimsuky
#cyberwarfare

The Ethical Hackers Who Exposed North Korean Cyber Operations

Ethical hackers 'Saber' and 'cyb0rg' expose North Korean Kimsuky hackers, highlighting vulnerabilities in state-sponsored cyber operations.

The DefendOps Diaries