home.social

#govware — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #govware, aggregated by home.social.

  1. The sentencing of Nicholas Moore (one-year probation) serves as a case study in credential-based breaches. By compromising one set of credentials, Moore gained access to the U.S. Supreme Court, AmeriCorps, and the VA."

    This highlights the persistent danger of "low-effort" entry points into high-value targets.
    How are your organizations hardening against credential stuffing and lateral movement in the public sector?

    Source: techcrunch.com/2026/04/17/man-

    Engage with us in the thread. Follow for more technical breakdowns and vulnerability news.

    #InfoSec #Pentesting #OpSec #GovWare #CyberLaw #Technadu

  2. The sentencing of Nicholas Moore (one-year probation) serves as a case study in credential-based breaches. By compromising one set of credentials, Moore gained access to the U.S. Supreme Court, AmeriCorps, and the VA."

    This highlights the persistent danger of "low-effort" entry points into high-value targets.
    How are your organizations hardening against credential stuffing and lateral movement in the public sector?

    Source: techcrunch.com/2026/04/17/man-

    Engage with us in the thread. Follow for more technical breakdowns and vulnerability news.

    #InfoSec #Pentesting #OpSec #GovWare #CyberLaw #Technadu

  3. The sentencing of Nicholas Moore (one-year probation) serves as a case study in credential-based breaches. By compromising one set of credentials, Moore gained access to the U.S. Supreme Court, AmeriCorps, and the VA."

    This highlights the persistent danger of "low-effort" entry points into high-value targets.
    How are your organizations hardening against credential stuffing and lateral movement in the public sector?

    Source: techcrunch.com/2026/04/17/man-

    Engage with us in the thread. Follow for more technical breakdowns and vulnerability news.

    #InfoSec #Pentesting #OpSec #GovWare #CyberLaw #Technadu

  4. The sentencing of Nicholas Moore (one-year probation) serves as a case study in credential-based breaches. By compromising one set of credentials, Moore gained access to the U.S. Supreme Court, AmeriCorps, and the VA."

    This highlights the persistent danger of "low-effort" entry points into high-value targets.
    How are your organizations hardening against credential stuffing and lateral movement in the public sector?

    Source: techcrunch.com/2026/04/17/man-

    Engage with us in the thread. Follow for more technical breakdowns and vulnerability news.

    #InfoSec #Pentesting #OpSec #GovWare #CyberLaw #Technadu

  5. The sentencing of Nicholas Moore (one-year probation) serves as a case study in credential-based breaches. By compromising one set of credentials, Moore gained access to the U.S. Supreme Court, AmeriCorps, and the VA."

    This highlights the persistent danger of "low-effort" entry points into high-value targets.
    How are your organizations hardening against credential stuffing and lateral movement in the public sector?

    Source: techcrunch.com/2026/04/17/man-

    Engage with us in the thread. Follow for more technical breakdowns and vulnerability news.

    #InfoSec #Pentesting #OpSec #GovWare #CyberLaw #Technadu

  6. Grossartiges Podium zur Serie "Surveillance Fédérale" der @republik_magazin heute Abend im vollbesetzten Walcheturm.

    Ein engagiertes Publikum interessierte sich brennend für die von (v.l.n.r.) Lucia Herrmann moderierte Diskussion mit Informatiker @besendorf (#RSF), Journalistin @adfichter (#Republik) und Jurist @vgyoerffy (#DigiGes).

    Danke euch allen!

    #SurveillanceFédérale #Kabelaufklärung #NDB #BÜPF #Staatstrojaner #GovWare #Pegasus
    republik.ch/veranstaltungen/de

  7. @landley @DavittoKun Again: Simplicity on it's own has value!
    infosec.space/@OS1337/11179596

    I don't expect OS/1337 to become the major #Desktop OS or even put a significant dent into #Yocto #Linux's marketshare.

    But I'd rather want to see it as something that drives #CriticalInfrastructure like #MedicalIT, #PowerGrids and #PLCs instead of cringeworthy #Bloatware like #Windows that is laced with so much #Govware that we can truly say #Microsoft is incompetent...
    youtube.com/watch?v=SGmtP5Lg_t

    In the end, it may end up like #AlpineLinux but to be fair I want to basically find a sweet spot between #mkroot-level simplicity and most modern distros with some basic quality-of-life additions that one can choose (or not!) to use.

    Like a really basic package manager that takes away the hassle of "build it yourself" if one trusts me...
    github.com/OS-1337/spm

    OFC that could be self-hosted internally...

  8. @landley @DavittoKun Again: Simplicity on it's own has value!
    infosec.space/@OS1337/11179596

    I don't expect OS/1337 to become the major #Desktop OS or even put a significant dent into #Yocto #Linux's marketshare.

    But I'd rather want to see it as something that drives #CriticalInfrastructure like #MedicalIT, #PowerGrids and #PLCs instead of cringeworthy #Bloatware like #Windows that is laced with so much #Govware that we can truly say #Microsoft is incompetent...
    youtube.com/watch?v=SGmtP5Lg_t

    In the end, it may end up like #AlpineLinux but to be fair I want to basically find a sweet spot between #mkroot-level simplicity and most modern distros with some basic quality-of-life additions that one can choose (or not!) to use.

    Like a really basic package manager that takes away the hassle of "build it yourself" if one trusts me...
    github.com/OS-1337/spm

    OFC that could be self-hosted internally...

  9. @landley @DavittoKun Again: Simplicity on it's own has value!
    infosec.space/@OS1337/11179596

    I don't expect OS/1337 to become the major #Desktop OS or even put a significant dent into #Yocto #Linux's marketshare.

    But I'd rather want to see it as something that drives #CriticalInfrastructure like #MedicalIT, #PowerGrids and #PLCs instead of cringeworthy #Bloatware like #Windows that is laced with so much #Govware that we can truly say #Microsoft is incompetent...
    youtube.com/watch?v=SGmtP5Lg_t

    In the end, it may end up like #AlpineLinux but to be fair I want to basically find a sweet spot between #mkroot-level simplicity and most modern distros with some basic quality-of-life additions that one can choose (or not!) to use.

    Like a really basic paxkage manager that takes away the hassle of "build it yourself" if one trusts me...
    github.com/OS-1337/spm

    OFC that could be self-hosted internally...

  10. @landley @DavittoKun Again: Simplicity on it's own has value!
    infosec.space/@OS1337/11179596

    I don't expect OS/1337 to become the major #Desktop OS or even put a significant dent into #Yocto #Linux's marketshare.

    But I'd rather want to see it as something that drives #CriticalInfrastructure like #MedicalIT, #PowerGrids and #PLCs instead of cringeworthy #Bloatware like #Windows that is laced with so much #Govware that we can truly say #Microsoft is incompetent...
    youtube.com/watch?v=SGmtP5Lg_t

    In the end, it may end up like #AlpineLinux but to be fair I want to basically find a sweet spot between #mkroot-level simplicity and most modern distros with some basic quality-of-life additions that one can choose (or not!) to use.

    Like a really basic paxkage manager that takes away the hassle of "build it yourself" if one trusts me...
    github.com/OS-1337/spm

    OFC that could be self-hosted internally...

  11. @autonomysolidarity

    1. Alle vollverschlüsseln!
    2. Keine |ed nutzen [, ].
    3. Alle korrekt Ende-zu-Ende verschlüsseln [PGP/MIME für & - für ]
    4. Sichere Passwürter nutzen!
    5. Passwordmanager nutzen um sichere Passwörter zu sichern!

    Das ist so simpel dass ich das bei diversen deployed hab mit 5-15min Einarbeitung der User*innen.

  12. @autonomysolidarity

    1. Alle #Datenträger vollverschlüsseln!
    2. Keine #Backdoor|ed #Govware nutzen [#Windows, #macOS].
    3. Alle #Kommunikation korrekt Ende-zu-Ende verschlüsseln [PGP/MIME für #eMail & #XMPP - #OMEMO für #Chats]
    4. Sichere Passwürter nutzen!
    5. Passwordmanager nutzen um sichere Passwörter zu sichern!

    Das ist so simpel dass ich das bei diversen #TechIlliterates deployed hab mit 5-15min Einarbeitung der User*innen.

  13. @autonomysolidarity

    1. Alle #Datenträger vollverschlüsseln!
    2. Keine #Backdoor|ed #Govware nutzen [#Windows, #macOS].
    3. Alle #Kommunikation korrekt Ende-zu-Ende verschlüsseln [PGP/MIME für #eMail & #XMPP - #OMEMO für #Chats]
    4. Sichere Passwürter nutzen!
    5. Passwordmanager nutzen um sichere Passwörter zu sichern!

    Das ist so simpel dass ich das bei diversen #TechIlliterates deployed hab mit 5-15min Einarbeitung der User*innen.