home.social

Search

392 results for “daniel1820815”

  1. @daniel1820815 Fascinating article. Excellent work. My question is: I always run in a and was wondering if this helps protect against exploits, or if it is no protection at all.

  2. @daniel1820815 Ich werde über kurz oder lang mein #pihole zwar installiert aber nicht scharf geschaltet lassen. Das filtern unter #proxmox funktioniert unzuverlässig und was noch schlimmer ist, das Clients im Subnet nicht erkannt werden. Und ja unter einem #rasberrypi hat es ohne zu klagen Funktion.

  3. @daniel1820815 is the open source fork of Vault if you go that direction. In general, I look at the potential threats first. Inside of the container, the secret will be available, and the host has access to the container.

    The advantage of tools like Vault is central storage/access to those secrets, and the ability to continuously and automatically rotate those secrets. But the latter needs support from all parts of the application.

    github.com/openbao/openbao

  4. From #CheckPoint Research:

    Mediaworks Data Extortion Attack

    Hungarian media company #Mediaworks, which operates dozens of newspapers and online outlets, was hit by a data-theft extortion attack. The company confirmed an intrusion after World Leaks posted 8.5TB of internal files online, reportedly including payroll records, contracts, financial documents, and internal communications.

    research.checkpoint.com/2026/1

  5. From #CheckPoint Research:

    Zara Supply Chain Attack

    #Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.

    research.checkpoint.com/2026/1

  6. From #CheckPoint Research:

    Zara Supply Chain Attack

    #Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.

    research.checkpoint.com/2026/1

  7. From #CheckPoint Research:

    Zara Supply Chain Attack

    #Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.

    research.checkpoint.com/2026/1

  8. From #CheckPoint Research:

    Zara Supply Chain Attack

    #Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.

    research.checkpoint.com/2026/1

  9. From #CheckPoint Research:

    Zara Supply Chain Attack

    #Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.

    research.checkpoint.com/2026/1

  10. "Ab wann tickt die Uhr bei der NIS-2-Meldefrist

    NIS-2 verpflichtet Unternehmen zu einem dreistufigen Meldeverfahren bei erheblichen Sicherheitsvorfällen, mit einer Frühwarnung innerhalb von 24 Stunden. Die entscheidende Frage ist dabei nicht wann der Vorfall passiert, sondern ab wann ein Unternehmen davon Kenntnis hat. Denn schon ein begründeter Verdacht kann die Meldefrist auslösen und wer dann zögert, riskiert persönliche Haftung der Geschäftsführung."

    security-insider.de/nis2-melde

    Assess your organization against #NIS2 and #DORA, pinpoint key regulatory gaps, and gain a clear, prioritized plan to strengthen resilience and demonstrate ongoing compliance.

    checkpoint.com/de/services/str

  11. "Ab wann tickt die Uhr bei der NIS-2-Meldefrist

    NIS-2 verpflichtet Unternehmen zu einem dreistufigen Meldeverfahren bei erheblichen Sicherheitsvorfällen, mit einer Frühwarnung innerhalb von 24 Stunden. Die entscheidende Frage ist dabei nicht wann der Vorfall passiert, sondern ab wann ein Unternehmen davon Kenntnis hat. Denn schon ein begründeter Verdacht kann die Meldefrist auslösen und wer dann zögert, riskiert persönliche Haftung der Geschäftsführung."

    security-insider.de/nis2-melde

    Assess your organization against #NIS2 and #DORA, pinpoint key regulatory gaps, and gain a clear, prioritized plan to strengthen resilience and demonstrate ongoing compliance.

    checkpoint.com/de/services/str

  12. "Ab wann tickt die Uhr bei der NIS-2-Meldefrist

    NIS-2 verpflichtet Unternehmen zu einem dreistufigen Meldeverfahren bei erheblichen Sicherheitsvorfällen, mit einer Frühwarnung innerhalb von 24 Stunden. Die entscheidende Frage ist dabei nicht wann der Vorfall passiert, sondern ab wann ein Unternehmen davon Kenntnis hat. Denn schon ein begründeter Verdacht kann die Meldefrist auslösen und wer dann zögert, riskiert persönliche Haftung der Geschäftsführung."

    security-insider.de/nis2-melde

    Assess your organization against #NIS2 and #DORA, pinpoint key regulatory gaps, and gain a clear, prioritized plan to strengthen resilience and demonstrate ongoing compliance.

    checkpoint.com/de/services/str

  13. "Ab wann tickt die Uhr bei der NIS-2-Meldefrist

    NIS-2 verpflichtet Unternehmen zu einem dreistufigen Meldeverfahren bei erheblichen Sicherheitsvorfällen, mit einer Frühwarnung innerhalb von 24 Stunden. Die entscheidende Frage ist dabei nicht wann der Vorfall passiert, sondern ab wann ein Unternehmen davon Kenntnis hat. Denn schon ein begründeter Verdacht kann die Meldefrist auslösen und wer dann zögert, riskiert persönliche Haftung der Geschäftsführung."

    security-insider.de/nis2-melde

    Assess your organization against #NIS2 and #DORA, pinpoint key regulatory gaps, and gain a clear, prioritized plan to strengthen resilience and demonstrate ongoing compliance.

    checkpoint.com/de/services/str

  14. "Ab wann tickt die Uhr bei der NIS-2-Meldefrist

    NIS-2 verpflichtet Unternehmen zu einem dreistufigen Meldeverfahren bei erheblichen Sicherheitsvorfällen, mit einer Frühwarnung innerhalb von 24 Stunden. Die entscheidende Frage ist dabei nicht wann der Vorfall passiert, sondern ab wann ein Unternehmen davon Kenntnis hat. Denn schon ein begründeter Verdacht kann die Meldefrist auslösen und wer dann zögert, riskiert persönliche Haftung der Geschäftsführung."

    security-insider.de/nis2-melde

    Assess your organization against #NIS2 and #DORA, pinpoint key regulatory gaps, and gain a clear, prioritized plan to strengthen resilience and demonstrate ongoing compliance.

    checkpoint.com/de/services/str

  15. AI Security Masters E8 - Claude Mythos: New Era in Cyber Security

    Join #CheckMates on May 19th at 5 PM CET for an exciting session on #Claude #Mythos, where we'll discuss what happens when #AI moves from assistant to autonomous security operator.

    checkpoint.zoom.us/webinar/reg

  16. AI Security Masters E8 - Claude Mythos: New Era in Cyber Security

    Join #CheckMates on May 19th at 5 PM CET for an exciting session on #Claude #Mythos, where we'll discuss what happens when #AI moves from assistant to autonomous security operator.

    checkpoint.zoom.us/webinar/reg

  17. AI Security Masters E8 - Claude Mythos: New Era in Cyber Security

    Join #CheckMates on May 19th at 5 PM CET for an exciting session on #Claude #Mythos, where we'll discuss what happens when #AI moves from assistant to autonomous security operator.

    checkpoint.zoom.us/webinar/reg

  18. AI Security Masters E8 - Claude Mythos: New Era in Cyber Security

    Join #CheckMates on May 19th at 5 PM CET for an exciting session on #Claude #Mythos, where we'll discuss what happens when #AI moves from assistant to autonomous security operator.

    checkpoint.zoom.us/webinar/reg

  19. AI Security Masters E8 - Claude Mythos: New Era in Cyber Security

    Join #CheckMates on May 19th at 5 PM CET for an exciting session on #Claude #Mythos, where we'll discuss what happens when #AI moves from assistant to autonomous security operator.

    checkpoint.zoom.us/webinar/reg

  20. From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026

    Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.

    In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.

    checkpoint.zoom.us/webinar/reg

  21. From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026

    Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.

    In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.

    checkpoint.zoom.us/webinar/reg

  22. From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026

    Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.

    In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.

    checkpoint.zoom.us/webinar/reg

  23. From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026

    Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.

    In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.

    checkpoint.zoom.us/webinar/reg

  24. From #CheckPoint Research:

    Canvas Data Breach

    #Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.

    research.checkpoint.com/2026/1

  25. From #CheckPoint Research:

    Canvas Data Breach

    #Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.

    research.checkpoint.com/2026/1

  26. From #CheckPoint Research:

    Canvas Data Breach

    #Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.

    research.checkpoint.com/2026/1

  27. From #CheckPoint Research:

    Canvas Data Breach

    #Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.

    research.checkpoint.com/2026/1

  28. From #CheckPoint Research:

    Canvas Data Breach

    #Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.

    research.checkpoint.com/2026/1

  29. TechTalk: The State of Ransomware Q1 2026 - Key Trends and Their Impact

    Join #CheckMates on May 13th, for an exciting TechTalk on the latest state of ransomware report.

    In this session, #CheckPoint Research will present key insights from the State of #Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact.

    checkpoint.zoom.us/webinar/reg

  30. TechTalk: The State of Ransomware Q1 2026 - Key Trends and Their Impact

    Join #CheckMates on May 13th, for an exciting TechTalk on the latest state of ransomware report.

    In this session, #CheckPoint Research will present key insights from the State of #Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact.

    checkpoint.zoom.us/webinar/reg