Here are some free Threat Intel Feeds:
Awesome list of Threat Intel Resources: https://github.com/hslatman/awesome-threat-intelligence#frameworks-and-platforms
This instance was built to provide another home for the global InfoSec community.
It is run in a distributed architecture using PaaS and IaaS components from AWS. It was designed to be speedy, available and secure.
I myself am an InfoSec practitioner living in the SF Bay Area. My human interface supports English and German.
Have FUN and stay SAFE!
Support the Campaign to Stop Killer Robots! “Killing in the Age of Algorithms”, a NYT documentary examining the future of artificial intelligence and warfare https://www.nytimes.com/2019/12/13/technology/autonomous-weapons-video.html @BanKillerRobots
#Welcome to IOC.exchange! I hope you were able to find interesting content on the Fediverse already. If you haven't, please feel free to look at the people I follow.
In addition, you can use https://distsn.org/ to find other users that are interested in similar topics.
If you have any questions, feel free to reach out! We all help each other on the Fediverse and there are usually no attitudes at play 😃
"One small way to get our independence and agency back from exploitative platforms is to build personal websites to share on instead. It’s a step to taking back control, and building a web that neither relies upon, nor feeds, the harms of Big Tech."
Great post by @laura
I think I'm going to focus really hard on YourSecure.Life this year and really make that my business.
Linus Torvalds: Git is a distributed version control system, which means even if you lose a remote, you still have your local copy, so your code is safe, unlike centralized VCSes.
Developer Community: wut?
Microsoft: Hmm. How about you use our Visual Studio Online and push it to GitHub, both hosted on our computers, so that you don't have a local copy?
Developer Community: Yaay! Such innovation! Very cloud! Much wow! 🎉
Trump: Thou shall not use US services.
Developers: Where's my code? 😭
Longest #InfoSec #tools list I have ever seen https://medium.com/@markmotig/security-tool-list-update-dec-2020-99a27aec3dfd
The Githubification of #InfoSec #blueteam https://medium.com/@johnlatwc/the-githubification-of-infosec-afbdbfaad1d1
Also if you're red team/pentestering, look for logs! You might get lucky and find someone who's done this (or typed <username><password> into the username field and hit enter) #infosec
<.< If you ever end up typing/pasting your password into the username field, (and it gets submitted) then consider it compromised and change it. x.x (Because it'll get logged somewhere and/or sent plaintext depending…
fun fact about #tor hidden services ("onion services" a.k.a. the dark web):
because there are only ever a few thousand hidden services live at any given time, many are somewhat vulnerable to traffic fingerprinting attacks.
if you run a hidden service, how can you make it less fingerprintable? currently, the best advice: avoid large web pages. make your pages small and dynamic.
Cyber blue team leader by day, tinkerer/hacker at night.
Architecting secure systems and traveling the world is what I like.
Unfair, harsh, inconsiderate behavior is what I don't like.
INDICATORS OF COMPROMISE (IOC)
InfoSec Community within the Fediverse. Instance is supposed to be fast and secure. Everyone is welcome - Jump on Board!
Our blogs can be found here: https://rfc.ioc.exchange
Other Cyber Communities:
HAVE FUN and STAY SAFE!