97 Followers
57 Following
16 Posts
Wall of Sheep, Capture The Packet, Packet Hacking Village, Juice Jacking, DEF CON DevOps, Entrepreneur

The moment has arrived - the #DEFCON33 Call Season is officially afoot! There are a bunch of Calls to peruse at leisure from Contests to Soundtrack to Vendors, and all the info you need to get started is @ https://defcon.org/html/defcon-33/dc-33-cfi.html

Don’t let your dreams be dreams! Let's get after it!
#defcon

DEF CON® 33 Hacking Conference - Call Index

The open and closed calls index for DEF CON 33

#DefCon32 Hotline

You can reach #DEFCON staff during normal hours of operation to anonymously report any behavior violating our code of conduct or to find an empathic ear! You can contact us via:

Voice Call, SMS/Text, or Signal:
+1 (725) 222-0934
or Discord: @defconhotline

We hope you have a safe and fun #DefCon32!

Well, this isn’t good for #mastodon users. Thankfully they released a patch yesterday.

https://www.bleepingcomputer.com/news/security/mastodon-vulnerability-allows-attackers-to-take-over-accounts/

Mastodon vulnerability allows attackers to take over accounts

Mastodon, the free and open-source decentralized social networking platform, has fixed a critical vulnerability that allows attackers to impersonate and take over any remote account.

BleepingComputer

A critical vulnerability in Atlassian's Jira Service Management Server and Data Center could allow an unauthenticated attacker to impersonate other users and gain remote access to the systems.

https://www.bleepingcomputer.com/news/security/atlassian-fixes-critical-bug-giving-access-to-jira-service-management/

Atlassian fixes critical bug giving access to Jira Service Management

A critical vulnerability in Atlassian's Jira Service Management Server and Data Center could allow an unauthenticated attacker to impersonate other users and gain remote access to the systems.

BleepingComputer
Happy Holidays!

DEFCON Training Announcement: 2023 Call for Trainers is open!

We’re expanding our DEF CON Training in 2023 to include events in Seattle, Las Vegas and Singapore, and we are looking for trainers!

If you’ve got experience and the kind of info hackers and security researchers can use, this means you. Please consider applying - all the information you need is available at https://training.defcon.org.

#defcon #defcontraining #CallForTrainers

DEF CON Security Training

defcontrainings

defcontrainings
If you haven't looked for a job in awhile, the market has changed and there are a *ton* more scams out there. Liticode has a guide to some of them here: https://www.liticode.com/post/the-worst-sort-of-scoundrels
The Worst Sort of Scoundrels

Preying on the desperate is a horrible practice. When it comes to job postings, there's a lot of amoral people collecting applicant information by posting jobs that don't exist, are no longer available, or are entirely fake. They do this for a variety of reasons, but for our purposes here, all we need to know is that they are fraudulently representing themselves as job sites when in fact all they do is collect the applicant information for ulterior purposes, some of which are nefarious, like ide

Liticode

Small scoop that I'm breaking here first. InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI) to build cyber and physical threat information sharing partnerships with the private sector, this week saw its database of contact information on more than 80,000 members go up for sale on an English-language cybercrime forum.

Meanwhile, the hackers responsible are communicating directly with members through the InfraGard portal online -- using a new account under the assumed identity of a financial industry CEO that was vetted by the FBI itself.

https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/?v=2

FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked – Krebs on Security

Leaving sunny Orlando for possible snow in Seattle?