hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

8.9K
active users

#BugBounty

15 posts11 participants4 posts today
Alonso Caballero / ReYDeSFinalizamos la primera sesión del Curso Forense Redes 2025. Información: https://www.reydes.com/e/Curso_Forense_de_Redes Información (PDF): https://www.reydes.com/archivos/cursos/Curso_Forense_Redes.pdf ¡Gracias a todos los participantes! #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Geoff ♞<p>Just watching syscalls misses io_uring interface to the kernel allowing malware to go undetected. </p><p>On the news I missed front:<br><a href="https://www.theregister.com/2025/04/29/linux_io_uring_security_flaw/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/04/29/lin</span><span class="invisible">ux_io_uring_security_flaw/</span></a></p><p>PoC Code:<br><a href="https://github.com/armosec/curing" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/armosec/curing</span><span class="invisible"></span></a></p><p>The article mentions a couple of endpoint detection &amp; prevention tools, but not giant <a href="https://infosec.exchange/tags/crowdstrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crowdstrike</span></a> <br>Interested to see if CrowdStrike watches io_uring calls. (I bet it will now.) </p><p><a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a></p>
Alonso Caballero / ReYDeSIniciamos la primera sesión del Curso Forense Redes 2025. Información: https://www.reydes.com/e/Curso_Forense_de_Redes Información (PDF): https://www.reydes.com/archivos/cursos/Curso_Forense_Redes.pdf #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Rubén Santos García<p>Want to level up your smart contract audits?<br>I just dropped a guide on how to use Slither's Python API to:<br>✅ Analyze Solidity structure<br>✅ Detect unused code<br>✅ Build custom detectors<br>✅ Improve output with Rich<br>Read it here 👉 <a href="https://www.kayssel.com/post/web3-18/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">kayssel.com/post/web3-18/</span><span class="invisible"></span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/Web3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Web3</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a></p>
Alonso Caballero / ReYDeS🔴 Mañana domingo 4 de mayo inicia el Curso Forense de Redes 2025. ⌛️Domingos 4, 11, 18 y 25 de Mayo. De 9:00 am a 12:00 pm (UTC -05:00). 🌎 Más información: https://www.reydes.com/e/Curso_Forense_de_Redes #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Alonso Caballero / ReYDeS🎓 Curso Forense Redes 2025 🗓️ Domingos 4, 11, 18 y 25 de Mayo 🕘 De 9:00 am a 12:00 pm (UTC -05:00) 📲 WhatsApp: https://wa.me/51949304030 🎯 Información (PDF): https://www.reydes.com/archivos/cursos/Curso_Forense_Redes.pdf #cybersecurity #hacking #readteam #bugbounty #forensics #osint
ByteSectorX<p>The Rise of Artificial Intelligence in Cybersecurity: What to Expect</p><p><a href="https://bytesectorx.blogspot.com/2024/11/the-rise-of-artificial-intelligence-in-cybersecurity-what-to-expect.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bytesectorx.blogspot.com/2024/</span><span class="invisible">11/the-rise-of-artificial-intelligence-in-cybersecurity-what-to-expect.html</span></a></p><p><a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/ArtificialInteligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtificialInteligence</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/CYBER" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CYBER</span></a> <a href="https://mastodon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://mastodon.social/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://mastodon.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a></p>
Marco Ivaldi<p>A couple of days ago, I unearthed my first <a href="https://infosec.exchange/tags/computer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computer</span></a>, an <a href="https://infosec.exchange/tags/MSX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSX</span></a> straight from the ‘80s. It was lost in some box in the basement for who knows how long. Just feeling its power switch gave me the goosebumps…</p><p>This discovery came after sharing my hacker’s origin story with Nic Fillingham and Wendy Zenone in a new episode of Microsoft’s <a href="https://infosec.exchange/tags/BlueHat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueHat</span></a> <a href="https://infosec.exchange/tags/Podcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Podcast</span></a>. </p><p><a href="https://thecyberwire.com/podcasts/the-bluehat-podcast/52/notes" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberwire.com/podcasts/the-</span><span class="invisible">bluehat-podcast/52/notes</span></a></p><p>Join us while we chat about my first-ever <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a>, overlooked <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> that continue to pose significant risks today, <a href="https://infosec.exchange/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActiveDirectory</span></a> and <a href="https://infosec.exchange/tags/password" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>password</span></a> security, my unexpected journey into <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> hunting and my involvement in the <a href="https://infosec.exchange/tags/ZeroDayQuest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDayQuest</span></a>, how to learn new things, mentorship and positive leadership, and of course pineapple pizza 🍍🍕</p>
Alonso Caballero / ReYDeSAlonso Eduardo Caballero Quezada 🎓 Curso Forense Redes 2025 🗓️ Domingos 4, 11, 18 y 25 de Mayo 🕘 De 9:00 am a 12:00 pm (UTC -05:00) 📲 WhatsApp: https://wa.me/51949304030 👍 Información: https://www.reydes.com/e/Curso_Forense_de_Redes #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Alonso Caballero / ReYDeS🐞 Webinar Gratuito: "Filtros para Captura con TcpDump" ⬆️ Jueves 1 de Mayo del 2025. De 4:00pm a 4:45pm (UTC -05:00) 🌐 Registro libre en: https://www.reydes.com/e/eventos #hacking #cybersecurity #readteam #bugbounty #dfri #osint
N-gated Hacker News<p>😂 Oh, bravo! One tiny bug transforms into an $8,000 digital buffet, gobbling up 2 petabytes of data like a voracious toddler with a never-ending appetite for Google Cloud! 🍽️ No worries, just another day in the life of "Oops, I did it again" coding! 🎉<br><a href="https://pietrasiak.com/one-line-of-code-that-did-cost-dollar8000" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pietrasiak.com/one-line-of-cod</span><span class="invisible">e-that-did-cost-dollar8000</span></a> <a href="https://mastodon.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://mastodon.social/tags/digitalbuffet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitalbuffet</span></a> <a href="https://mastodon.social/tags/cloudcomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudcomputing</span></a> <a href="https://mastodon.social/tags/coderlife" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coderlife</span></a> <a href="https://mastodon.social/tags/dataoverload" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataoverload</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ngated</span></a></p>
Alonso Caballero / ReYDeS🎓 Curso Forense Redes 2025 🗓️ Domingos 4, 11, 18 y 25 de Mayo 🕘 De 9:00 am a 12:00 pm (UTC -05:00) 👍 Información (PDF): https://www.reydes.com/archivos/cursos/Curso_Forense_Redes.pdf #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Alonso Caballero / ReYDeS🛜 Webinar Gratuito: "Filtros para Captura con TcpDump" 🌟 Jueves 1 de Mayo del 2025. De 4:00pm a 4:45pm (UTC -05:00) 🆓 Registro libre en: https://www.reydes.com/e/eventos #hacking #cybersecurity #readteam #bugbounty #dfri #osint
Alonso Caballero / ReYDeS🎓 Curso Forense Redes 2025 🗓️ Domingos 4, 11, 18 y 25 de Mayo 🕘 De 9:00 am a 12:00 pm (UTC -05:00) 👍 Información: https://www.reydes.com/e/Curso_Forense_de_Redes #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Alonso Caballero / ReYDeS📢 Webinar Gratuito: "Filtros para Captura con TcpDump" 🗓️ Jueves 1 de Mayo del 2025. De 4:00pm a 4:45pm (UTC -05:00) 🆓 Registro libre en: https://www.reydes.com/e/eventos #hacking #cybersecurity #readteam #bugbounty #dfri #osint
Alonso Caballero / ReYDeSFinalizamos la cuarta y última sesión del Curso OSINT - Open Source Intelligence 2025. Más información: https://www.reydes.com/e/Curso_de_OSINT WhatsApp: https://wa.me/51949304030 ¡Muchas Gracias a todos los participantes! #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Alonso Caballero / ReYDeSIniciamos la cuarta y última sesión del Curso OSINT - Open Source Intelligence 2025. Más información: https://www.reydes.com/e/Curso_de_OSINT WhatsApp: https://wa.me/51949304030 #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Rubén Santos García<p>This week’s focus: Kerberos attacks every pentester should master.</p><p>Learn about AS-REP Roasting, Kerberoasting, Pass-the-Ticket, and more, with practical tips and lab recommendations.</p><p>📬 Read the new issue here: <a href="https://www.kayssel.com/newsletter/issue-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">kayssel.com/newsletter/issue-2/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a></p>
Bug Bounty Shorts<p>This article explains a cunning tactic employed by cyber attackers - hiding scheduled tasks or jobs on infected systems, which can help malware maintain persistence even after system reboot or antivirus cleaning. Readers will learn how to spot these hidden dangers and understand advanced ways attackers misuse scheduled tasks. The takeaway is that knowing this technique aids in detecting malicious activities earlier. <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a></p><p><a href="https://medium.com/@paritoshblogs/detecting-hidden-scheduled-tasks-at-jobs-created-by-malware-c9038d5d4544?source=rss------bugbounty-5" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@paritoshblogs/dete</span><span class="invisible">cting-hidden-scheduled-tasks-at-jobs-created-by-malware-c9038d5d4544?source=rss------bugbounty-5</span></a></p>
Alonso Caballero / ReYDeS🟤 Curso Forense Redes 2025 🗓️ Domingos 4, 11, 18 y 25 de Mayo 🕘 De 9:00 am a 12:00 pm (UTC -05:00) 👉 Información (PDF): https://www.reydes.com/archivos/cursos/Curso_Forense_Redes.pdf #cybersecurity #hacking #readteam #bugbounty #forensics #osint