mastodon.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
A newer server operated by the Mastodon gGmbH non-profit

Server stats:

11K
active users

#opsec

179 posts149 participants2 posts today

OpSec is Hard
Joined a local FaceBook political action group. Wanted to lurk for a while. Dang thing apparently auto posts "Welcome New Members... [long list of names]". Mentioned that might be bad idea to group admins. No clue. #OpSec

Continued thread

On Wed evening, #Trump met w/VP #JDVance; the WH chief of staff, #SusieWiles; the WH personnel chief, #SergioGor; his Mideast envoy, #SteveWitkoff, & others about whether to stick w/ #MikeWaltz.

Late Thurs, as the controversy swirled, Trump summoned Waltz to the Oval Office. By the next morning, Trump signaled to people around him that he was willing to stick w/Waltz….

#CommanderInChief? #Unfit #NationalSecurity #Signal #SignalGate #law #military #OpSec

Twitter, #X, hit by massive data breach potentially impacting 2.8 billion users, inside job suspected - “A data leak involving a whopping 2.87 billion Twitter (X) users has surfaced on the infamous Breach Forums. According to a post by a user named ThinkingOne, the leak is the result of a disgruntled X employee who allegedly stole the data during a period of mass layoffs. If true, this would be the largest social media data leak in history, but surprisingly, neither X nor the broader public appears to be aware of it.” #DataBreach #DataPrivacy #opsec #infosec #Twitter #privacy
hackread.com/twitter-x-of-2-8-

X (Twitter) Largest Data Breach Ever? 2.8 Billion User Info Exposed
Hackread - Latest Cybersecurity, Tech, AI, Crypto & Hacking News · Twitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider JobFollow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Whoa, looks like BlackLock got hacked. Seriously, it just hammers home how vital good security practices are – even if you're on the *other* side of the fence! Major OPSEC blunder right there, wouldn't you say? 😉

And hey, this really drives home another point: relying *only* on automated scans? That's just not cutting it for real-deal pentesting, people. You absolutely have to get hands-on and dig in manually. There's no substitute for it.

Honestly, that’s the kind of thorough work our clients appreciate – when we actually probe deeper than just the surface findings. It makes a difference.

So, what’s your take? Seems like OPSEC gets overlooked way too often, doesn't it? Curious to hear your thoughts!

Replied in thread

@knittingknots2 Everybody knows white people don't have to get security clearances. Their is always top shelf!

In Kegseth's case, the shelves are definitely lower but you know what I mean.

@linuxgal

I've held various security clearances over the decades and what is pissing me off and I see VERY few people mention it is one HUGE factor in this OPSEC violation.

They were using 3rd party apps to bypass security data retention policy for their activities.

That in and of itself, it illegal.

#MAGA
#OPSEC