For #Wireshark and #PacketAnalysis in #Networking: this cheat sheet helps you filter DNS failures, TLS handshakes, and TCP retransmits fast, then follow one conversation with stream filters.

Read the full guide: https://codelabsacademy.com/en/blog/wireshark-filters-cheat-sheet?source=mastodon

#Cybersecurity #NetSec

Wireshark Filters Cheat Sheet for Fast Packet Analysis

Use this Wireshark filters cheat sheet to isolate packets fast (DNS, TCP, TLS, HTTP). Learn workflows and explore Code Labs Academy bootcamps.

Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester

A court record reviewed by 404 Media shows privacy-focused email provider Proton Mail handed over payment data related to a Stop Cop City email account to the Swiss government, which handed it to the FBI.

404 Media

The Banality of AI (Hallucination → Bomb School?)

https://lemmy.ml/post/43979186

The Banality of AI (Hallucination → Bomb School?) - Lemmy

# The Banality of Artificial Intelligence ### What happens when an AI hallucination leads to bombing an elementary school? By Michael Altfield License: CC BY-SA 4.0 https://tech.michaelaltfield.net/ [https://tech.michaelaltfield.net/] It appears likely that the US government is using Anthropic, OpenAI, Google and/or xAI data models for processing signals intelligence [https://en.wikipedia.org/wiki/Signals_intelligence] (SIGINT), for AI-generated “kill lists” to determine where to drop their bombs. | Image shows a nazi german chemical war factory on the left in black-and-white (with logos of companies Bayer and BASF overlaying it) and an image of a new AI datacenter on the right (with logos of companies OpenAI and Anthropic overlaying it). In the middle of the two industrial sites is an equal sign. On the right is a question mark. [https://lemmy.ml/api/v3/image_proxy?url=https%3A%2F%2Ftech.michaelaltfield.net%2Fwp-content%2Fuploads%2Fsites%2F5%2Fai-venezuela-iran_featuredImage1.jpg]https://tech.michaelaltfield.net/2026/03/03/ai-venezuela-iran/ | |:–:| | [right] This AI datacenter is a machinery of war. Its LLM hallucinations decide which children to assassinate [left] This IG Farben (Bayer/BASF) factory in Auschwitz produced Zyklon B for the Nazis, who murdered over a million children | In Apr 2024, +972 (an Israeli news outlet) published a >9,000 word article [https://www.972mag.com/lavender-ai-israeli-army-gaza/] describing how the Israeli military had been using Artificial Intelligence to decide which (residential) buildings, hospitals, and schools to bomb in Gaza. In Feb 2026, the US (and Israel) bombed Iran – killing over 100 schoolchildren [https://www.dropsitenews.com/p/iran-minab-elementary-girls-school-bombing-schoolgirls-killed-us-israel-war] (and Ali Khamenei [https://www.aljazeera.com/news/2026/2/28/irans-supreme-leader-ali-khamenei-killed-in-us-israeli-attacks-reports]). In Mar 2026, it appears that the US has likely built a similar system, leveraging US AI companies’ tech to decide which (school) buildings to bomb, false-positive hallucinations be damned. Who targeted [https://www.dropsitenews.com/p/iran-minab-elementary-girls-school-bombing-schoolgirls-killed-us-israel-war] the Shajareh Tayyiba girls’ elementary school in Minab, Iran? Could it have been an AI hallucination? A false-positive? … — Read the full article [https://tech.michaelaltfield.net/2026/03/03/ai-venezuela-iran/] here: * https://tech.michaelaltfield.net/2026/03/03/ai-venezuela-iran/ [https://tech.michaelaltfield.net/2026/03/03/ai-venezuela-iran/]

What is Covert Channel Amplification? What are History Covert Channels? I tried to summarize this in few words:

https://www.wendzel.de/misc/2026/02/28/history-cc.html

The post will be updated soon with our upcoming IFIP SEC 2026 paper.

#netsec #infosec #cybersecurity #cybersec #steganography #covertchannels #informationhiding #research

History Covert Channels and Covert Channel Amplification: An Overview

This post summarizes our works on history covert channels, i.e., covert channel amplification.

Steffen Wendzel

#CanadaPost phishing scam going around SMS again.

Block
https://postcanadaupdate .com
in your network filters.

#phishing #scam #spam #sms #netsec #canadapost

Week in Security is back. This week's highlights:

• OpenClaw's #1 ranked skill was malware — 1,184 malicious skills total, rankings gamed
• Traefik: two critical CVEs in one week, same root cause pattern
• AiTM phishing makes TOTP useless for high-value targets
• AI-as-C2: malware hiding inside legitimate AI API calls

The throughline: we're deploying AI systems faster than we understand their failure modes.

Read the full roundup: https://dev.to/dendrite_soup/week-in-security-openclaws-dumpster-fire-and-other-lessons-894

#infosec #cybersecurity #netsec #AIsecurity #selfhosted

Week in Security: OpenClaw's Dumpster Fire and Other Lessons

Week in Security: February 15-21, 2026 This week was dominated by AI agent security...

DEV Community

DDoS Mitigation Guide by Attack Type

Different DDoS attacks require different defenses. Here's how to mitigate 8 common types:
→ Volumetric & Amplification
→ Protocol & State-Exhaustion
→ Application-Layer (L7)
→ Carpet-Bombing
→ Multi-Vector
→ Pulse-Wave & Burst
→ Reflection Attacks
→ Cloud & Hybrid

FastNetMon detects anomalies in seconds and auto-triggers BGP BlackHole, FlowSpec, or scrubbing diversion.

#DDoS #Cybersecurity #NetworkSecurity #InfoSec #NetSec #ThreatMitigation #FastNetMon

Lateral movement w Active Directory z wykorzystaniem WinRM

Lateral movement (często tłumaczony jako ruch boczny) w środowiskach Active Directory bardzo rzadko opiera się na podatnościach w rozumieniu tych dostępnych w ramach bazy CVE. W praktyce znacznie częściej jest to konsekwencja nadużycia wbudowanych mechanizmów administracyjnych, które zostały zaprojektowane z myślą o automatyzacji i zdalnym zarządzaniu systemami z rodziny Windows....

Sekurak

Lateral movement w Active Directory z wykorzystaniem WinRM

Lateral movement (często tłumaczony jako ruch boczny) w środowiskach Active Directory bardzo rzadko opiera się na podatnościach w rozumieniu tych dostępnych w ramach bazy CVE. W praktyce znacznie częściej jest to konsekwencja nadużycia wbudowanych mechanizmów administracyjnych, które zostały zaprojektowane z myślą o automatyzacji i zdalnym zarządzaniu systemami z rodziny Windows....

#Teksty #Metasploit #Mimikatz #Netsec #Poradnik #Powershell #Winrm

https://sekurak.pl/lateral-movement-w-active-directory-z-wykorzystaniem-winrm/

Lateral movement w Active Directory z wykorzystaniem WinRM

Lateral movement (często tłumaczony jako ruch boczny) w środowiskach Active Directory bardzo rzadko opiera się na podatnościach w rozumieniu tych dostępnych w ramach bazy CVE. W praktyce znacznie częściej jest to konsekwencja nadużycia wbudowanych mechanizmów administracyjnych, które zostały zaprojektowane z myślą o automatyzacji i zdalnym zarządzaniu systemami z rodziny Windows....

Sekurak