home.social

#security-engineering — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #security-engineering, aggregated by home.social.

fetched live
  1. Linux Privilege Escalation Cheat Sheet: Techniques and Prevention.

    In this cheat sheet, I break down essential enumeration commands, common escalation paths, and practical techniques every security professional should know.
    denizhalil.com/2025/06/30/linu

    #CyberSecurity #LinuxSecurity #PrivilegeEscalation #Pentesting #RedTeam #BlueTeam #InfoSec #ethicalhacking #SecurityEngineering #itsecurity

  2. UDP Network Monitoring with C++: A Comprehensive Guide

    In this guide, I demonstrate how to build a UDP packet sniffer in C++ using raw sockets, parse packet headers, and extract key data like source/destination IPs and ports.
    denizhalil.com/2025/07/14/udp-

    #CyberSecurity #NetworkMonitoring #PacketSniffer #UDP #Cpp #NetworkSecurity #InfoSec #BlueTeam #RedTeam #InfoSec #securityengineering #denizhalil

  3. Python C2 Server for Red Teaming: A Comprehensive Hands-On Guide

    In this guide, I walk through building a Python-based C2 server, covering its architecture, encrypted communication, and real-world operational workflow.
    denizhalil.com/2025/12/15/pyth

    #CyberSecurity #RedTeam #C2 #commandandcontrol #Python #offensivesecurity #Pentesting #infosec #threatdetection #blueteam #securityengineering #ethicalhacking

  4. SSH Tunneling and Port Forwarding Techniques: A Comprehensive Guide

    In this article, I cover:
    * How SSH tunneling works under the hood
    * Local, remote, and dynamic port forwarding techniques
    * Real-world use cases (databases, internal services, pivoting)
    * Security risks and hardening recommendations

    denizhalil.com/2026/02/02/ssh-

    #CyberSecurity #sshtunneling #portforwarding #NetworkSecurity #Linux #RedTeam #BlueTeam #Pentesting #InfoSec #securityengineering #EthicalHacking #ITSecurity

  5. Most AWS IAM knowledge isn’t learned in tutorials — it’s learned at 3AM during outages.

    From AccessDenied errors to SCP traps and policy misconfigurations, this deep dive reveals real-world IAM troubleshooting strategies used by experienced engineers.

    Read now: shorturl.at/6PmBR

    #AWS #IAM #CloudSecurity #DevOps #SRE #CloudEngineering #AWSTips #SecurityEngineering #tech

  6. Beyond the surface of a steel door lies a world of precision engineering. From internal reinforcements to blast-resistant cores. Ever wondered what makes a security door virtually impenetrable?

    We’re peeling back the steel layers to show you.

    vocal.media/stories/the-hidden
    #SecurityEngineering #SteelDoors #PhysicalSecurity #Architecture #BuildingDefense

  7. OpenAI confirmed that limited API-user data was exposed through a breach at its previous analytics provider, Mixpanel. The dataset included names, emails, coarse location, user/organization IDs, and technical metadata — but no chats, passwords, API keys, or payment data.

    Researchers noted that sending identifiable data to analytics tools isn’t aligned with typical security best practices.

    What’s your view on data minimization in analytics pipelines?

    Source: cybernews.com/security/openai-

    Share your thoughts - and follow us for more updates.

    #InfoSec #CyberSecurity #DataPrivacy #OpenAI #Mixpanel #APISecurity #DataBreach #VendorSecurity #ThreatIntel #SecurityEngineering #TechNews

  8. New blog post live for my Sentinel Saturday series! :1000: :apartyblobcat:
    Read the blog 👉 marshsecurity.org/sentinel-sat

    In this post, I explore the power of using Microsoft Sentinel Tasks as part of your automation workflows.

    Most teams aren’t getting the full #value out of Tasks in Microsoft Sentinel. Are you? When you combine Sentinel Tasks with automation, they become a game-changer.

    - Auto-create tasks when automation fails (so nothing slips through the cracks)
    - Auto-complete tasks when automation succeeds
    - Use tasks to verify automation outcomes
    - Build engineering feedback loops and automation #QA

    Read the blog 👉 marshsecurity.org/sentinel-sat

    #MicrosoftSentinel #SentinelAutomation #CyberSecurity #SOCAutomation
    #CloudSecurity #AzureSecurity #SIEM #SecOps #Automation #InfoSec
    #CyberSecurityCommunity #BlueTeam #ThreatDetection #SecurityEngineering #SecurityOperations

  9. A Canon Hall of Fame classic by Dr. Ross Anderson continues to prove its significance in modern security practices.

    Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with many points from two recent canon-reviewed books, as well as an old favorite, 𝘚𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘌𝘯𝘨𝘪𝘯𝘦𝘦𝘳𝘪𝘯𝘨.

    While Ron Woerner’s Canon review was of the 2008 2nd edition, Dr. Anderson has since released a 3rd edition just a few years ago.

    📰 cybercanon.substack.com/p/nove

    🛍️ If interested in purchasing the latest edition and supporting the Canon, please consider using this affiliate link: amzn.to/47NiFa4

    #CybersecurityBooks #SecurityEngineering

  10. Hello #InfoSec community!

    I'm James (JMo), a Institute of Data x Michigan Tech Cybersecurity Bootcamp grad who built an open-source security scanner as part of my capstone project.

    **JMo Security** orchestrates 11 tools (Trivy, Semgrep, TruffleHog, ZAP, Falco) with:
    ✅ Multi-target scanning (repos, containers, IaC, web apps, GitLab, K8s)
    ✅ Auto-compliance mapping (OWASP, CWE, NIST, PCI DSS, CIS, ATT&CK)
    ✅ Unified reporting (dashboard, SARIF, JSON)

    **Quick start:**
    pip install jmo-security jmotools wizard

    📖 Docs: docs.jmotools.com
    🐙 GitHub: github.com/jimmy058910/jmo-sec

    **Actively seeking #DevSecOps / #AppSec roles!** DMs open for opportunities or technical feedback.

    What security tools are you using in your workflows?

    #CyberSecurity #OpenSource #Python #SecurityEngineering #JobSearch

  11. Prompt injections are still a problem – August 2025 edition

    Independent AI researcher Johann Rehberger (previously) has had an absurdly busy August. Under the heading The Month of AI Bugs he has been publishing one report per day across an array of different tools, all of which are vulnerable to various classic prompt injection problems. This is a fantastic and horrifying demonstration of how widespread and dangerous these vulnerabilities still are, almost three years after we first started talking about them.

    Johann’s published research in August so far covers ChatGPT, Codex, Anthropic MCPs, Cursor, Amp, Devin, OpenHands, Claude Code, GitHub Copilot and Google Jules. There’s still half the month left!

    The Summer of Johann: prompt injections as far as the eye can see

    Previously:

    https://gurupanguji.com/2025/06/15/prompt-injection-continues-to-be-a-major-vector-of-attack-for-llms/?utm_source=rss&utm_medium=rss&utm_campaign=prompt-injection-continues-to-be-a-major-vector-of-attack-for-llms

    https://gurupanguji.com/2025/04/23/notes-on-llms/

    https://gurupanguji.com/2025/08/06/trust-in-the-world-of-ai/

    #ai #engineering #llms #model #promptInjection #security #securityEngineering #software

  12. 🔐SSH and shell-free
    🧱Immutable by default
    🔁Trusted Boot out of the box

    Because we believe security starts at the foundation. Here's what makes Talos Linux different.

    🔗 siderolabs.com/blog/mastering-

    #Kubernetes #TalosLinux #DevSecOps #CloudNative #SecurityEngineering

  13. This hands-on guide shows how to build secure, scalable data pipelines using open source tools like Filebeat, Logstash, Kafka, and Ansible.

    Learn to collect, transform, enrich, and centralize security telemetry from Windows, Linux, and network sources. A practical resource for anyone supporting detection, forensics, or incident response.

    nostarch.com/data-engineering-

    #securityengineering #blueTeam #loganalysis #opensource

  14. 📣 We’re expanding.

    To reach more of the #Fediverse and engage with #AI, #Privacy, and #Security voices outside the infosec world, you can now also find us at:
    👉 @confsec

    Same mission. Same stance:
    🔐 Provable privacy
    🚫 No visibility, no retention
    ✅ Built for compliance, AI, and trust

    #CyberSecurity #AIPrivacy #PrivateAI #LLM #SecurityEngineering #DataPrivacy

  15. Automation made us fast.
    AI agents might make us fearless—or reckless.
    In this deep-dive opinion piece, we explore how DevSecOps evolves when autonomous AI joins the team.
    What gets better? What gets worse? Let’s talk.

    #DevSecOps #AI #Automation #SecurityEngineering #TechLeadership #AIInSecurity

    webdad.eu/2025/06/18/devsecops

  16. From scanning ports to structuring security programs that meet real-world demands, this book helps practitioners level up from technical know-how to strategic capability.

    It bridges foundational knowledge with practical security leadership. Designed for those who build, defend, and explain security every day

    nostarch.com/foundationsinfosec

    #infosec #cybersecurity #securityengineering #nmap #SOC2 #compliance #devops #securityculture

  17. Day 1 of posting to social media until I get an offensive security research job

    First, I’m going to start with what I know – Windows. I need to recreate what I had access to at Microsoft, so that starts by setting up a dev environment and finding a copy of Windows System Internals, perhaps the greatest resource for learning Windows out there. My expertise is in Windows and virtualization, so I’m going to make sure I master those areas.

    Next, I don’t think I want to grind coding exercises, but I do need to shake the rust off my coding skills. I think I’m going to start with some HackTheBox challenges and find some CTFs to participate in.

    Finally, my long overdue goal: learn Rust. I’m not sure if this will help immediately, as I could choose to improve my knowledge of Python. But Rust was getting more and more popular in the areas of Windows I was tasked with protecting, so I need to learn what all the fuss is about with regards to memory safety.

    If anyone is on a similar journey, let’s hold each other accountable in the comments! I will be sure to document any write-ups at blog.maxrenke.com (work in progress).

    #OffensiveSecurity #CyberSecurity #WindowsInternals #HackTheBox #CTF #EthicalHacking #RedTeam #BlueTeam #RustLang #PythonProgramming #DevEnvironment #InfoSec #CyberCareer #SecurityResearch #MemorySafety #CyberCommunity #JobSearch #TechJourney #SecurityEngineering #Pentesting #LearningEveryDay