bolha.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a Brazilian IT Community. We love IT/DevOps/Cloud, but we also love to talk about life, the universe, and more. | Nós somos uma comunidade de TI Brasileira, gostamos de Dev/DevOps/Cloud e mais!

Server stats:

252
active users

#CyberSecurity

549 posts261 participants57 posts today
nearshorecyber<p>Don't get too comfortable.</p><p><a href="https://recruiterflow.com/nsc/jobs#menu" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">recruiterflow.com/nsc/jobs#menu</span><span class="invisible"></span></a> <br><a href="https://infosec.exchange/tags/permanentrevolution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>permanentrevolution</span></a> <a href="https://infosec.exchange/tags/innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>innovation</span></a> <a href="https://infosec.exchange/tags/history" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>history</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Serbia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Serbia</span></a>: Journalists targeted with <a href="https://mastodon.thenewoil.org/tags/Pegasus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pegasus</span></a> <a href="https://mastodon.thenewoil.org/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a></p><p><a href="https://www.amnesty.org/en/documents/eur70/9186/2025/en/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">amnesty.org/en/documents/eur70</span><span class="invisible">/9186/2025/en/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/NSOGroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSOGroup</span></a> <a href="https://mastodon.thenewoil.org/tags/journalism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>journalism</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/OpenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenAI</span></a> now pays researchers $100,000 for critical vulnerabilities</p><p><a href="https://www.bleepingcomputer.com/news/security/openai-now-pays-researchers-100-000-for-critical-vulnerabilities/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/openai-now-pays-researchers-100-000-for-critical-vulnerabilities/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p>
AI6YR Ben<p>Wow, there sure are a lot of license plate readers around here. </p><p>There's a website which lists where they are....</p><p><a href="https://deflock.me/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">deflock.me/</span><span class="invisible"></span></a></p><p><a href="https://m.ai6yr.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://m.ai6yr.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
ChiefGyk3D<p>Just recorded a deep dive on the SignalGate fiasco from a cybersecurity + compliance angle. Nearly an hour long, packed with info for both tech &amp; non-tech folks to understand why it’s so bad and what we can learn. <br><a href="https://social.chiefgyk3d.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.chiefgyk3d.com/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.chiefgyk3d.com/tags/SignalGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SignalGate</span></a> <a href="https://social.chiefgyk3d.com/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a>-as-a-service operation uses DNS-over-HTTPS for evasion</p><p><a href="https://www.bleepingcomputer.com/news/security/phishing-as-a-service-operation-uses-dns-over-https-for-evasion/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/phishing-as-a-service-operation-uses-dns-over-https-for-evasion/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://mastodon.thenewoil.org/tags/DoH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DoH</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p>New <a href="https://mastodon.thenewoil.org/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ubuntu</span></a> <a href="https://mastodon.thenewoil.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> security bypasses require manual mitigations</p><p><a href="https://www.bleepingcomputer.com/news/security/new-ubuntu-linux-security-bypasses-require-manual-mitigations/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-ubuntu-linux-security-bypasses-require-manual-mitigations/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a></p>
Redhotcyber<p>Signal è abbastanza sicuro per la CIA e per il CISA. Lo è anche per te?</p><p>📌 Link all'articolo : <a href="https://www.redhotcyber.com/post/signal-e-abbastanza-sicuro-per-la-cia-e-per-il-cisa-lo-e-anche-per-te/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/signal-e-</span><span class="invisible">abbastanza-sicuro-per-la-cia-e-per-il-cisa-lo-e-anche-per-te/</span></a></p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.bida.im/tags/cyberthreatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberthreatintelligence</span></a> <a href="https://mastodon.bida.im/tags/innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>innovation</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/engineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>engineering</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/OracleHealth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OracleHealth</span></a> breach compromises patient data at US hospitals</p><p><a href="https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/oracle-health-breach-compromises-patient-data-at-us-hospitals/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/Oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oracle</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://mastodon.thenewoil.org/tags/healthcare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>healthcare</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Ente" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ente</span></a> Photos v1</p><p><a href="https://ente.io/blog/v1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">ente.io/blog/v1/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/photos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>photos</span></a></p>
Alex Jimenez<p>The Quantum Apocalypse Is Coming. Be Very Afraid</p><p>What happens when quantum computers can finally crack encryption and break into the world’s best-kept secrets? It’s called Q-Day—the worst holiday maybe ever.</p><p><a href="https://www.wired.com/story/q-day-apocalypse-quantum-computers-encryption/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/q-day-apocalyp</span><span class="invisible">se-quantum-computers-encryption/</span></a></p><p><a href="https://mas.to/tags/QuantumComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QuantumComputing</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Gemini" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gemini</span></a> hackers can deliver more potent attacks with a helping hand from… Gemini</p><p><a href="https://arstechnica.com/security/2025/03/gemini-hackers-can-deliver-more-potent-attacks-with-a-helping-hand-from-gemini/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">03/gemini-hackers-can-deliver-more-potent-attacks-with-a-helping-hand-from-gemini/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Mullvad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mullvad</span></a>: Multihop now available on <a href="https://mastodon.thenewoil.org/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a></p><p><a href="https://mullvad.net/en/blog/2025/3/28/multihop-now-available-on-android" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mullvad.net/en/blog/2025/3/28/</span><span class="invisible">multihop-now-available-on-android</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/AIs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIs</span></a> as Trusted Third Parties</p><p><a href="https://www.schneier.com/blog/archives/2025/03/ais-as-trusted-third-parties.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/03/ais-as-trusted-third-parties.html</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/TTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TTP</span></a></p>
CTI.FYI<p>🚨New ransom group blog post!🚨</p><p>Group name: lynx<br>Post title: Martin Mechanical (martin.local)<br>Info: <a href="https://cti.fyi/groups/lynx.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cti.fyi/groups/lynx.html</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
The New Oil<p>Italian government reportedly admits targeting activists</p><p><a href="https://www.euractiv.com/section/politics/news/spyware-scandal-italian-government-reportedly-admits-targeting-activists/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">euractiv.com/section/politics/</span><span class="invisible">news/spyware-scandal-italian-government-reportedly-admits-targeting-activists/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> <a href="https://mastodon.thenewoil.org/tags/Italy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italy</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/politics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>politics</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/DAITA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DAITA</span></a> version 2 now available on all platforms</p><p><a href="https://mullvad.net/en/blog/2025/3/28/daita-version-2-now-available-on-all-platforms" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mullvad.net/en/blog/2025/3/28/</span><span class="invisible">daita-version-2-now-available-on-all-platforms</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/Mullvad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mullvad</span></a> <a href="https://mastodon.thenewoil.org/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Brian Greenberg<p>🛡️ Online Tracking Is Out of Control — Here’s How You Can Fight Back — The Electronic Frontier Foundation (EFF) is taking aim at online surveillance with Privacy Badger, a free, open-source browser extension designed to block trackers and disrupt the business model of behavioral advertising.</p><p>🔍 Here’s how it protects your privacy:<br>🔹 Blocks third-party trackers and cookies from loading on websites.<br>🔹 Sends Global Privacy Control (GPC) signals to opt out of data sharing (legally binding in several U.S. states).<br>🔹 Neutralizes social media trackers by replacing embedded content with click-to-activate placeholders.<br>🔹 Disrupts adtech profits by denying them access to your data — weakening the surveillance economy.</p><p>📢 Until we have strong federal privacy laws, tools like Privacy Badger offer real, immediate protection.</p><p><a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/EFF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EFF</span></a> <a href="https://infosec.exchange/tags/DigitalRights" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalRights</span></a> <a href="https://infosec.exchange/tags/AdTech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AdTech</span></a> <a href="https://infosec.exchange/tags/OnlineTracking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnlineTracking</span></a><br><span class="h-card" translate="no"><a href="https://mastodon.social/@eff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>eff@mastodon.social</span></a></span><br><span class="h-card" translate="no"><a href="https://twitter.oksocial.net/users/eff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>eff@twitter.oksocial.net</span></a></span> </p><p><a href="https://www.eff.org/deeplinks/2025/03/online-tracking-out-control-privacy-badger-can-help-you-fight-back" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eff.org/deeplinks/2025/03/onli</span><span class="invisible">ne-tracking-out-control-privacy-badger-can-help-you-fight-back</span></a></p>
Brian Greenberg<p>🧬 Malware Is Evolving — And So Are the Languages It’s Written In — A new study highlights a growing tactic among malware developers: coding in uncommon languages to evade detection.</p><p>🔍 Key takeaways:<br>🔹 Obscure languages like Lisp, Rust, Haskell, Delphi, and Phix are harder for static analysis tools to parse.<br>🔹 These languages often produce fragmented memory layouts and more indirect execution paths, complicating reverse engineering.<br>🔹 Even the choice of compiler — like Tiny C or Embarcadero Delphi — impacts how easily malware can be flagged.<br>🔹 APTs (Advanced Persistent Threats) are increasingly adopting these strategies to fly under the radar.</p><p>💬 Security teams must broaden their detection capabilities and adapt tooling for these underrepresented programming environments.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Programming</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> </p><p><a href="https://www.theregister.com/2025/03/29/malware_obscure_languages/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/29/mal</span><span class="invisible">ware_obscure_languages/</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Tuta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tuta</span></a> sees 148% surge in new paying customers</p><p><a href="https://discuss.techlore.tech/t/we-at-tuta-see-148-surge-in-new-paying-customers-thanks-to-communities-like-yours/13156" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discuss.techlore.tech/t/we-at-</span><span class="invisible">tuta-see-148-surge-in-new-paying-customers-thanks-to-communities-like-yours/13156</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a></p>