The moment has arrived - the #DEFCON33 Call Season is officially afoot! There are a bunch of Calls to peruse at leisure from Contests to Soundtrack to Vendors, and all the info you need to get started is @ https://defcon.org/html/defcon-33/dc-33-cfi.html
Don’t let your dreams be dreams! Let's get after it!
#defcon
#DefCon32 Hotline
You can reach #DEFCON staff during normal hours of operation to anonymously report any behavior violating our code of conduct or to find an empathic ear! You can contact us via:
Voice Call, SMS/Text, or Signal:
+1 (725) 222-0934
or Discord: @defconhotline
We hope you have a safe and fun #DefCon32!
Well, this isn’t good for #mastodon users. Thankfully they released a patch yesterday.
A critical vulnerability in Atlassian's Jira Service Management Server and Data Center could allow an unauthenticated attacker to impersonate other users and gain remote access to the systems.
DEFCON Training Announcement: 2023 Call for Trainers is open!
We’re expanding our DEF CON Training in 2023 to include events in Seattle, Las Vegas and Singapore, and we are looking for trainers!
If you’ve got experience and the kind of info hackers and security researchers can use, this means you. Please consider applying - all the information you need is available at https://training.defcon.org.
Preying on the desperate is a horrible practice. When it comes to job postings, there's a lot of amoral people collecting applicant information by posting jobs that don't exist, are no longer available, or are entirely fake. They do this for a variety of reasons, but for our purposes here, all we need to know is that they are fraudulently representing themselves as job sites when in fact all they do is collect the applicant information for ulterior purposes, some of which are nefarious, like ide
Small scoop that I'm breaking here first. InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI) to build cyber and physical threat information sharing partnerships with the private sector, this week saw its database of contact information on more than 80,000 members go up for sale on an English-language cybercrime forum.
Meanwhile, the hackers responsible are communicating directly with members through the InfraGard portal online -- using a new account under the assumed identity of a financial industry CEO that was vetted by the FBI itself.
https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/?v=2