cablespaghetti.dev is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Cablespaghetti's personal snac instance
Admin email
sam@cablespaghetti.dev
Admin account
@sam@cablespaghetti.dev

Search results for tag #security

[?]gyptazy »
@gyptazy@gyptazy.com

Hey community! I would like to hear your thoughts on how you usually update your Proxmox nodes and clusters. How do you handle minor Proxmox and package upgrades with ?

What would you think about a new API endpoint that lets you run unattended upgrades with a simple call like:

/nodes/{node_name}/apt/upgrade
At the moment you need to use the node’s HTML5 console to perform upgrades. Other methods exist such as running unattended Debian upgrade scripts, using patch management tools like or , or automating the process with over SSH. My idea is to have an API based solution that relies on Proxmox authentication and authorization. This would also allow third party tools such as to provide automated patch management and even handle guest rebalancing in a way that is similar to DRS without requiring direct SSH access.
I have already been running this approach on several internal clusters since the release of PVE 8 without issues. Now I am interested to hear if you would use unattended upgrades in general or if you are already running them today.


A Proxmox Node running apt-get -y dist-upgrade command via API in a non interactive and unattended way by a patched and extended API from gyptazy

Alt...A Proxmox Node running apt-get -y dist-upgrade command via API in a non interactive and unattended way by a patched and extended API from gyptazy

    [?]Sindarina, Edge Case Detective »
    @sindarina@ngmx.com

    Along with the release of version 26 of every Apple operating system, Apple has also released point release updates for macOS Sequoia and Sonoma, an update to Safari 26 for both of those, and the latest versions of iOS/iPadOS 15, 16, and 18.

    So if you have an Apple device, you should update to the latest point release for your current version, even if you are not ready to upgrade to version 26.

    support.apple.com/en-us/100100

      [?]Chad McCullough »
      @cmccullough@polymaths.social

      If you run Firefox (or any of the forks), run uBlock Origin. Many ads are malicious. If a site won't open or won't function properly because you're using an ad blocker, leave the site. It really is as simple as that.

      #privacy #security

        [?]FreeBSD Foundation »
        @FreeBSDFoundation@mastodon.social

        Our friends at Karios recently shared why they chose FreeBSD as the foundation of their hardened operating system.

        This is another great example of how companies are leveraging FreeBSD to build secure, production-grade infrastructure.

        Curious how other organizations are using FreeBSD? Explore our collection of end-user stories to see real-world use cases and learn how FreeBSD is making an impact across industries:

        freebsdfoundation.org/end-user

          Wen boosted

          [?]Delphi »
          @Delphi@mastodon.scot

          When you have to buy :

          Do you worry about your data being shared?
          Are you concerned about your money disappearing?
          Upset when the box arrives & the clothing isn't as expected?

          I have the solution.

          Go to a . Look at the products. Feel them, try them on. Then pay with cash & leave the shop.

          A that's been available for decades & no or required.



            [?]Paul »
            @pwaring@social.xk7.net

            A 7 year old (yes really) has been referred to the National Crime Agency's Cyber Choices programme to understand the consequences of their actions.

            I hope the Head of IT at the school / local authority / trust has also been referred to a similar programme for Cyber Security training, because if a 7 year old can hack your systems then they must be wide open.

            bbc.co.uk/news/articles/c203pe

              Wen boosted

              [?]Mark »
              @paka@mastodon.scot

              promised no digital ID; it’s not in manifesto

              changes nature of our relationship with state turning into “papers, please” society

              It’s inconsistent with values underpinning free society & poses serious risks to privacy, security

              Centralised digital ID scheme are honeypot for creating huge for our

              Britain historically rejected various forms of mandatory ID. We must reject this one

              bigbrotherwatch.org.uk/campaig

                [?]Peter N. M. Hansteen »
                @pitrh@mastodon.social

                In two weeks, at EuroBSDCon, Tom Smyth and I will be giving a Network Management with the OpenBSD Packet Filter Toolset events.eurobsdcon.org/2025/tal tutorial.

                Register via 2025.eurobsdcon.org/registrati

                  [?]Ukraine News » 🤖
                  @karakam@mastodon.social

                  Drivers are urged to avoid the Izium-Slovyansk road due to the threat of drones, as the enemy is using FPV drones to attack military and civilian vehicles. The section of the M-03 road from Izium to Slovyansk is particularly dangerous.

                    UndeadJamie boosted

                    [?]Aaron »
                    @therealahall@gamerstavern.online

                    [?]Sindarina, Edge Case Detective »
                    @sindarina@ngmx.com

                    "iCloud Calendar invites are being abused to send callback phishing emails disguised as purchase notifications directly from Apple's email servers, making them more likely to bypass spam filters to land in targets' inboxes."

                    "While there is nothing particularly special about the phishing lure itself, the abuse of the legitimate iCloud Calendar invite feature, Apple's email servers, and an Apple email address adds a sense of legitimacy to the email and also allows it to potentially bypass spam filters as it comes from a trusted source."

                    Always be careful with unexpected calls to action.

                    bleepingcomputer.com/news/secu

                    Common problem, though, has been a problem with Google Calendar for ages, too;

                    bleepingcomputer.com/news/secu

                    In fact, pretty much all spam I get these days is from very persistent fuckers on Google and Microsoft servers, where it is apparently easy mode to stay under the radar, even if the most simplest form of filtering checks would catch it.

                      [?]ahimsa »
                      @ahimsa_pdx@disabled.social

                      @briankrebs
                      Here's a gift link (valid til Sept. 12) for the story on oregonlive.com just in case anyone has trouble with the "prove you're a human" page for the archive link

                      oregonlive.com/education/2025/

                        [?]Chewie »
                        @chewie@mammut.gogreenit.net

                        s1m0n4 boosted

                        [?]adingbatponder »
                        @adingbatponder@fosstodon.org

                        If a public foss repo offers a foss setup.sh command line script which, step by step, performs the installation / usage steps the repo readme lists for use at the command line to set up/use the code, what trust measures would you insist upon before downloading and before running the setup.sh script at your local command line? Is there a better way of offering an helpful automated but trustworthy than a scary .sh ?

                          [?]UK »
                          @uk@pubeurope.com

                          europesays.com/uk/399623/ Putin warns Western troops in Ukraine will be ‘legitimate targets’ for Russia – POLITICO

                          Putin warns Western troops in Ukraine will be ‘legitimate targets’ for Russia – POLITICO

                          Alt...Putin warns Western troops in Ukraine will be ‘legitimate targets’ for Russia – POLITICO

                            [?]nixCraft 🐧 »
                            @nixCraft@mastodon.social

                            Over the past few days Cloudflare has been notified through our vulnerability disclosure program and the certificate transparency mailing list that unauthorized certificates were issued by Fina CA for 1.1.1.1, one of the IP addresses used by our public DNS resolver service.

                            blog.cloudflare.com/unauthoriz

                            This is a general reminder that you don't need Cloudflare or any central DNS provider.

                              [?]Michal Bryxí »
                              @MichalBryxi@mastodon.world

                              As ab IT professional with >15 years experience, focusing ~4 years on security I'm confident to say:

                              > UX comes first, security second.

                              Reason being that people will *always* find a way around your crappy UX and break your imagined, bulletproof security. You do shit UX, you will have shit security.

                                [?]Peter N. M. Hansteen »
                                @pitrh@mastodon.social

                                My upcoming book, The Book of PF 4th edition, is part of B&N’s pre-order sale Sept 3–5! Use code PREORDER25 for 25% off (35% for Premium members).

                                barnesandnoble.com/w/the-book-

                                  [?]Em :official_verified: »
                                  @Em0nM4stodon@infosec.exchange

                                  New Privacy Guides article 🔒 🚩
                                  by me:

                                  They all claim:
                                  "Your privacy is important to us."
                                  But how can we know if that's true?

                                  With all the privacy washing and disinformation around, it becomes increasingly difficult to evaluate who we can trust with our data.

                                  There are red flags, and green(ish) flags, we can look for to help us assess who to trust, or not 🚩

                                  privacyguides.org/articles/202

                                    [?]Daniel Schildt »
                                    @autiomaa@mementomori.social

                                    Word is now saving ALL of your files to Microsoft's cloud environments (unless you disable it from the settings). Even your local files are copied there so that Microsoft can analyze the file contents with their AI systems.

                                    Instructions on how to disable that from the Word settings: techcommunity.microsoft.com/bl

                                      🗳

                                      [?]Peter N. M. Hansteen »
                                      @pitrh@mastodon.social

                                      While procrastinating something, I noticed a wave of script kiddie traffic with a browser ID string matching a Github hosted "security scanning" project, but one without contact info.

                                      Should I

                                      Just keep adding them to the webtrash list:1
                                      Try harder to warn them about above:0
                                      Name and shame:4
                                      Don't care, show results:0

                                        [?]Peter N. M. Hansteen »
                                        @pitrh@mastodon.social

                                        Chewie boosted

                                        [?]Freezenet »
                                        @freezenet@noc.social

                                        Study Confirms, Yet Again, That Age Verification Packed With Privacy and Security Risks

                                        Another study is being tossed onto the pile of evidence showing that age verification is a privacy and security nightmare.

                                        freezenet.ca/study-confirms-ye

                                          [?]nixCraft 🐧 »
                                          @nixCraft@mastodon.social

                                          Microsoft has confirmed that Windows 11 users will not be able to uninstall the controversial “Recall” feature, despite earlier reports suggesting otherwise. Recall, part of the Copilot+ suite announced in May, automatically captures screenshots of user activity on the operating system including sensitive information such as passwords or financial data digitalmarketreports.com/news/ Do yourself a favor and get rid of Windows from your life—enough of these greedy companies.

                                            Terence Eden boosted

                                            [?]Lobsters » 🤖
                                            @lobsters@mastodon.social

                                            Chewie boosted

                                            [?]PrivacyDigest »
                                            @PrivacyDigest@mas.to

                                            Refuses To Divulge Data Flows To - Slashdot

                                            Freedom of Information documents reveal that Microsoft cannot guarantee data , may process data in "hostile" jurisdictions, retains key control, and blocks vetting of overseas staff -- all leaving the force unable to comply with strict Part 3 data protection rules.

                                            slashdot.org/story/25/08/28/18

                                              Rocketman boosted

                                              [?]knoppix »
                                              @knoppix95@mastodon.social

                                              What's an open-source tool you literally can't live without?
                                              Drop it below. 👇

                                              Remember to boost 🔁 so we get more hidden gems. 🧵🔥

                                                [?]mle✨ »
                                                @mle@infosec.exchange

                                                🔮 Pondering my ORB - A look at PolarEdge Adjacent Infrastructure

                                                censys.com/blog/pondering-my-o

                                                  [?]Wen »
                                                  @Wen@mastodon.scot

                                                  Microsoft can't guarantee data sovereignty

                                                  What a surprise. Don’t allow Microsloth to hold your data, don’t store it in the US - that would be a good start.

                                                  theregister.com/2025/08/27/ovh

                                                    [?]Peter N. M. Hansteen »
                                                    @pitrh@mastodon.social

                                                    The next scheduled "Network Management with the OpenBSD Packet Filter Toolset" fullday session is at EuroBSDcon in Zagreb, 2025-09-25 10:30–17:30: events.eurobsdcon.org/2025/tal

                                                    register here: 2025.eurobsdcon.org/registrati

                                                      [?]Nonilex »
                                                      @Nonilex@masto.ai

                                                      Public broadcaster said Danish government & sources which it didn’t name, as well as unidentified sources in & the , believe that at least 3 US nationals w/ connections to have been carrying out operations in the territory.

                                                      1 of those people allegedly compiled a list of US-friendly Greenlanders, collected names of people opposed to Trump & got locals to point out cases that could be used to cast in a bad light in US media.

                                                        [?]Jeri Dansky »
                                                        @jeridansky@sfba.social

                                                        I really enjoy @zackwhittaker's weekly newsletter, this week in security, because:

                                                        1. It's written at a level I can understand, as person somewhat tech savvy but certainly far from a security expert.

                                                        2. It's not on Substack! It was on MailChimp but just moved to Ghost.

                                                        3. Each newsletter ends with a cyber cat.

                                                        Good stuff; check it out if you're at all interested in security news.
                                                        this.weekinsecurity.com

                                                        Photo of a fluffy white cat sitting in an office chair, with this text above the photo:
This week's cyber cat is CISO Storm, who can be seen here supervising active defense from the cyber-security team. You're doing the absolute best work, Storm, keep it up. Thanks so much to Paul W. for sending in!

                                                        Alt...Photo of a fluffy white cat sitting in an office chair, with this text above the photo: This week's cyber cat is CISO Storm, who can be seen here supervising active defense from the cyber-security team. You're doing the absolute best work, Storm, keep it up. Thanks so much to Paul W. for sending in!

                                                          mle✨ boosted

                                                          [?]mle✨ »
                                                          @mle@infosec.exchange

                                                          This week we wrapped up our 2025 State of the Internet blog series, in which we examined malicious infrastructure through a variety of lenses.

                                                          More specifically, we explored coordinated C2 takedowns, malware linked to the DPRK's fraudulent employment operations, lifespans of C2 servers and open web directories, and the use of residential network devices as proxies for malicious activity.

                                                          Take a look! I'm biased, but I think these posts make for some fun reading:

                                                          censys.com/blog/2025-state-of-

                                                            Back to top - More...