cablespaghetti.dev is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Cablespaghetti's personal snac instance
Admin email
sam@cablespaghetti.dev
Admin account
@sam@cablespaghetti.dev

Search results for tag #security

[?]Julian » 🌐
@mialikescoffee@social.tchncs.de

Where can I find fellow fedi users that moved to the to work in the sector, especially related roles like security analyst or security engineer? 💻 🇳🇱

I am looking forward to connect with you :)

    [?]Mark » 🌐
    @paka@mastodon.scot

    Switzerland Ends Contract Over Risks -

    ’s decision to discontinue the use of Palantir is not a story.

    - It's a management story. The platform was not rejected because it failed to perform. On the contrary, it delivered advanced data fusion and operational insight.

    It was rejected because the residual sovereignty risk was considered unacceptable.

    [1/2]

      [?]Mark » 🌐
      @paka@mastodon.scot

      This case shows the growing dilemma that many countries now face. In a global supply chain economy, the most capable are rarely national

      - They are built, operated, updated, and legally elsewhere

      For domains such as , , , and , this creates a structural tension between performance and control.

      zendata.security/2026/02/14/sw

      [2/2]

        [?]Netscape Navigator » 🌐
        @NetscapeNavigator@social.vivaldi.net

        In a capitalist society privacy is only as good as it is profitable.

          [?]Michal Bryxí [he/him] » 🌐
          @MichalBryxi@mastodon.world

          > There is sunshine and rainbows in our future Hank because strong security is simple security. stink. Multiffactor authentication () where you type in a code stinks. So really we to be secure we have to take the human out of the equation and that means it'll be easier for us.

          youtu.be/V6pgZKVcKpw?si=NilUbn

            [?]Lobsters » 🤖 🌐
            @lobsters@mastodon.social

            Terence Eden boosted

            [?]Terence Eden [He/Him/♂/男] » 🌐
            @Edent@mastodon.social

            🆕 blog! “FobCam '25 - All my MFA tokens on one page”

            Some ideas are timeless. Back in 2004, an anonymous genius set up "FobCam". Tired of having to carry around an RSA SecurID token everywhere, our hero simply left the fob at home with an early webcam pointing at it. And then left the page open for all to see.

            Security expert Bruce…

            👀 Read more: shkspr.mobi/blog/2025/04/fobca

            (Probably)

              [?]FreeBSD Foundation » 🌐
              @FreeBSDFoundation@mastodon.social

              We’ve published the second monthly report (March 2026) for the Cyber Resilience Act Readiness project, part of our ongoing 2026 effort to prepare the FreeBSD community for the European Union’s cybersecurity regulation.

              Read the March report: github.com/FreeBSDFoundation/a

                s1m0n4 boosted

                [?]Patrick » 🌐
                @ppb1701@ppb.social

                Proton built their entire brand on one promise: Swiss law means government agencies can't touch your data.
                Their own Terms of Service, their own infrastructure contracts, and a federal court case from March say otherwise.

                blog.ppb1701.com/not-even-gove

                  [?]LWN.net » 🌐
                  @lwn@fedi.lwn.net

                  [?]Kyle Rankin » 🌐
                  @kyle@mastodon.kylerank.in

                  In the past, many FOSS proponents would mistakenly apply the "many eyes make bugs shallow" quote to all classes of bugs, in particular security ones. That historically hasn't been true because you need security expertise to find security bugs, it's not democratized in the same way as general classes of bugs.

                  LLMs have now changed that. This blog post by Thomas Ptacek does a good job of explaining what is going on:

                  sockpuppet.org/blog/2026/03/30

                    [?]LWN.net » 🌐
                    @lwn@fedi.lwn.net

                    [$] A flood of useful security reports

                    The idea of using large language models (LLMs) to discover security problems is not new. Google's Project Zero investigated the feasibility of using LLMs for security research in 2 [...]

                    lwn.net/Articles/1066581/

                      [?]LWN.net » 🌐
                      @lwn@fedi.lwn.net

                      [?]Peter N. M. Hansteen » 🌐
                      @pitrh@mastodon.social

                      yes, this happened:

                      Apr 8 23:46:59 skapet sshd-session[69515]: Failed none for invalid user Can't locate List/Util.pm in @INC (you may need to install the List from 175.199.67.164 port 51226 ssh2

                      (and several times more, of course)

                      Background: "Badness, Enumerated by Robots" nxdomain.no/~peter/badness_enu and links therein

                        [?]Aaron Toponce ⚛️:debian: » 🌐
                        @atoponce@fosstodon.org

                        The and maintainer accounts have been locked out by Microsoft. They are now unable to deliver Windows updates.

                        cybernews.com/security/microso

                          Aral Balkan boosted

                          [?]🇩🇪 🇺🇦 🇨🇦:nonazis: » 🌐
                          @ManyRoads@mstdn.social

                          [?]LWN.net » 🌐
                          @lwn@fedi.lwn.net

                          Nix privilege escalation security advisory

                          lwn.net/Articles/1066813/

                            [?]LWN.net » 🌐
                            @lwn@fedi.lwn.net

                            Juha Uotila boosted

                            [?]GrapheneOS » 🌐
                            @GrapheneOS@grapheneos.social

                            GrapheneOS version 2026040600 released:

                            grapheneos.org/releases#202604

                            See the linked release notes for a summary of the improvements over the previous release.

                            Forum discussion thread:

                            discuss.grapheneos.org/d/33898

                              hexa- boosted

                              [?]nixpkgs security changes » 🤖 🌐
                              @nixpkgssecuritychanges@social.gerbet.me

                              feld boosted

                              [?]ArcaneChat » 🌐
                              @arcanechat@fosstodon.org

                              BREAKING: reportedly a baby was sighted successfully self-hosting a relay after accidentally typing on the keyboard of unsupervised parent's laptop

                                [?]LWN.net » 🌐
                                @lwn@fedi.lwn.net

                                [?]Peter N. M. Hansteen » 🌐
                                @pitrh@mastodon.social

                                Socket boosted

                                [?]Frontend Dogma » 🤖 🌐
                                @frontenddogma@mas.to

                                [?]LWN.net » 🌐
                                @lwn@fedi.lwn.net

                                [?]LWN.net » 🌐
                                @lwn@fedi.lwn.net

                                Hackers breached the European Commission (The Next Web)

                                lwn.net/Articles/1066371/

                                  [?]Graham Perrin » 🌐
                                  @grahamperrin@mastodon.bsd.cafe

                                  @nielsa no, that's not what I'm telling you.

                                  I prefer to believe that most people will be thoughtful.

                                  "… a huge number of bugs. I have so many bugs in the Linux kernel that I can't report because I haven't validated them yet. I'm not going to make some open source developer validate bugs that I haven't checked yet. I'm not going to send them potential slop … I now have … several hundred crashes that they haven't seen because I haven't had time to check them. We need to find a way to fix this …"

                                  – Nicholas Carlini

                                  Screenshot: a frame from https://www.youtube.com/watch?v=1sd26pWhfmg

                                  Alt...Screenshot: a frame from https://www.youtube.com/watch?v=1sd26pWhfmg

                                    [?]doragasu » 🌐
                                    @doragasu@mastodon.sdf.org

                                    ➡️ in 2025: Make sure your OS is up to date, use trusted apps from trusted sources, use strong passwords, beware of apps with excessive permission requests, be careful with phishing attempts...
                                    ➡️ Security in 2026: The most popular app in GitHub requires complete access to your system and personal accounts holding sensitive information, and you must assume your system is compromised 🤦‍♂️

                                    makes people dumb 🤷‍♂️
                                    arstechnica.com/security/2026/

                                      [?]gyptazy » 🌐
                                      @gyptazy@gyptazy.com

                                      Adding the new feature to for clusters during Easter is basically: hiding eggs → finding eggs → realizing some eggs are actually critical alerts

                                      For real, many people asked me for their smaller and mid-sized environments, how to handle remote syslog of their nodes. I had some ideas (some of you may have already found my Rust interpretation of this) but I think having this included in as a centralized management interface makes more sense.

                                      So, PegaProx comes with an own syslog server (ipv4/ipv6, udp/tcp, encrypted/unencrypted support) and is wired to the interface within the resources tab. Providing a quick overview of all your logs and filter options. The next thing is wiring it to the notification system of PegaProx, allowing automated alerting. Might be nice to quickly identify when the quorum got lost - all built-in into PegaProx!


                                      A syslog integration (server & frontend audit) for PegaProx for Proxmox based clusters

                                      Alt...A syslog integration (server & frontend audit) for PegaProx for Proxmox based clusters

                                        [?]LWN.net » 🌐
                                        @lwn@fedi.lwn.net

                                        Paco Hope boosted

                                        [?]Metin Seven 🎨 » 🌐
                                        @metin@graphics.social

                                        [?]LWN.net » 🌐
                                        @lwn@fedi.lwn.net

                                        [?]LWN.net » 🌐
                                        @lwn@fedi.lwn.net

                                        mle✨ boosted

                                        [?]mle✨ » 🌐
                                        @mle@infosec.exchange

                                        Last summer I looked at the Internet exposure of a few devices that have historically been the subject of attacks by Iranian threat actors. Given continued activity in the region, I refreshed that data and took another look at exposures.

                                        Good news: all four device/software types showed at least a slight decrease in exposures since last June, even if we aren't entirely sure why.

                                        More details + graphs here: censys.com/blog/ics-iran-part-

                                          [?]Hylke Bons 🥜 » 🌐
                                          @hbons@mastodon.social

                                          if you like this, I'm aiming to provide at least one project with an app icon every week.

                                          honoured to have gained around 40 supporters in my first jobless month! ❤️

                                          your sponsorship will help me keep this up. :)

                                          mastodon.social/@hbons/1161661

                                          [?]Hylke Bons 🥜 » 🌐
                                          @hbons@mastodon.social

                                          hey everyone,

                                          you may have guessed reading between the lines, but I lost my job in the recent tech layoffs…

                                          also burnt out and realised I need to go back to working on stuff I care about.

                                          I hope to gather enough small monthly sponsors to at least cover the bills, so I can:

                                          - 🖥️ create beautiful apps for /

                                          - ✏️ provide free support to projects

                                          if you like my work, please consider $1/month to make this possible?

                                          thank you. :)

                                          github.com/sponsors/hbons

                                              [?]Wen » 🌐
                                              @Wen@mastodon.scot

                                              [?]Paco Hope [He/Him] » 🌐
                                              @paco@infosec.exchange

                                              This article about ‘s CLI is also hysterical (in a making me want to give up and join a commune kind of hysterical) because of the anthropomorphising of the AI.

                                              What is the most frustrating aspect of LLMs? Many would use the anthropomorphic term “hallucination.” Apparently are bad but “dreams” are good?

                                              When a user goes idle or manually tells Anthropic to sleep at the end of a session, the AutoDream system would tell Claude Code that “you are performing a dream—a reflective pass over your memory files.”

                                              “Why does my code say that Wonder Woman is running a taco truck downtown and I’m the only person who can save her dog?” Oh. Right. It was dreaming.

                                                [?]Paco Hope [He/Him] » 🌐
                                                @paco@infosec.exchange

                                                We can quit and just go farm potatoes or something. After 25 years of one of the most talked-about tech companies invents a daemon process that

                                                makes use of a file-based “memory system” designed to allow for persistent operation across user sessions.

                                                Sure. Just store your system instructions in a random text file.

                                                Why are we installing endpoint protection on this system?

                                                Why do we verify cryptographic signatures on software updates to this system?

                                                Why are we building a zero trust security environment?

                                                Why do we do scan email to avoid social engineering emails?

                                                Our AI-assisted users are gonna YOLO right past all that. And if they can’t get past our controls, this agentic Frankenstein will write itself some markdown and work quietly in the background figuring out how to bypass something the user couldn’t bypass on their own.

                                                This is in 2026

                                                  chfkch :nixos: :rust: boosted

                                                  [?]Hylke Bons 🥜 » 🌐
                                                  @hbons@mastodon.social

                                                  done! drew the rest of the f***ing owl.

                                                  App icon for BitRitter in the GNOME icon style. A light blue shield with a thick darker blue border. Overlayed is a password field.

                                                  Alt...App icon for BitRitter in the GNOME icon style. A light blue shield with a thick darker blue border. Overlayed is a password field.

                                                    [?]Fedora Project » 🌐
                                                    @fedora@fosstodon.org

                                                    TLS and SSH rely on Certificate Authorities (CAs) for authentication, but they also present a vector for Man in the Middle attacks. What if you could set up your own CA to reduce your exposure?

                                                    ➡️ fedoramagazine.org/make-a-priv

                                                      [?]LWN.net » 🌐
                                                      @lwn@fedi.lwn.net

                                                      [?]Rich Stein (he/him) » 🌐
                                                      @RunRichRun@mastodon.social

                                                      Great distraction from the Epstein files and the thickening quagmire in Iran — but it's not going to lower gas prices nor help with the midterms:
                                                      U.S. plans a witch hunt — err... antifa summit.

                                                      Deflect and distract. 🙁
                                                      reuters.com/world/us/us-counte
                                                      h/t @Nonilex
                                                      masto.ai/@Nonilex/116323980616

                                                        [?]LWN.net » 🌐
                                                        @lwn@fedi.lwn.net

                                                        Vulnerability Research Is Cooked (sockpuppet.org)

                                                        lwn.net/Articles/1065586/

                                                          [?]LWN.net » 🌐
                                                          @lwn@fedi.lwn.net

                                                          [?]Larvitz :fedora: :redhat: » 🌐
                                                          @Larvitz@burningboard.net

                                                          Running your own identity provider is all fun and games until you're debugging OIDC token flows at 2 AM.

                                                          If you want to deploy Keycloak 26 the right way - with proper network isolation, no plaintext passwords, and systemd-native declarative configs. I just published a new deep-dive.

                                                          We're ditching compose files and building a production-ready, daemonless stack using Podman Quadlets and systemd.

                                                          Read the full guide here: blog.hofstede.it/keycloak-26-o

                                                            [?]Liminal witch 🧙‍♀️ Sarah [She/sie/tema] » 🌐
                                                            @xgebi@hachyderm.io

                                                            [?]IAintShootinMis » 🌐
                                                            @iaintshootinmis@digitaldarkage.cc

                                                            maintainer has lost control of their account. Malicious versions 1.14.1 and 0.30.4 have been published which include a RAT.

                                                            NPM has pulled the effected versions and the payload. Time to clean up and see if you were effected.

                                                            StepSecurity has an awesome write up on this issue with

                                                            Link follows this toot.

                                                              [?]ArcaneChat » 🌐
                                                              @arcanechat@fosstodon.org

                                                              Keep in contact with colleagues without having to give your phone number

                                                              With you can also keep separated profiles, one for family and more intimate friends and other for people you don't have so close relation with

                                                              ArcaneChat: Welcome to private chatting

                                                              Alt...ArcaneChat: Welcome to private chatting

                                                                [?]🇩🇪 🇺🇦 🇨🇦:nonazis: » 🌐
                                                                @ManyRoads@mstdn.social

                                                                Back to top - More...