What do you do when Nix isn't worth the time?
  • 0xCBE 0xCBE 1y ago 100%

    You build a derivation yourself... which I never do. I am on mac so I brew install and orchestrate brew from home manager. I find it works good as a compromise.

    2
  • github.com

    cross-posted from: https://infosec.pub/post/397812 > Automated Audit Log Forensic Analysis (ALFA) for Google Workspace is a tool to acquire all Google Workspace audit logs and perform automated forensic analysis on the audit logs using statistics and the MITRE ATT&CK Cloud Framework. > > By [Greg Charitonos](https://www.linkedin.com/in/charitonos/) and [BertJanCyber](https://twitter.com/BertJanCyber)

    3
    0
    www.chainguard.dev

    >We’ve made a few changes to the way we host and distribute our Images over the last year to increase security, give ourselves more control over the distribution, and most importantly to keep our costs under control [...]

    2
    0
    https://ksoc.com/blog/kubernetes-security-basics-series-part-i-deployment-and-container-orchestration

    >This first post in a 9-part series on Kubernetes Security basics focuses on DevOps culture, container-related threats and how to enable the integration of security into the heart of DevOps.

    4
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSE
    Security News 0xCBE 1y ago 100%
    Microsoft says early June disruptions to Outlook, cloud platform, were cyberattacks
    apnews.com
    3
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSE
    Security News 0xCBE 1y ago 83%
    CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability
    https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a
    4
    0
    www.forbes.com

    Not really technical, but gives some pointers to wrap your head around the problem

    5
    0
    www.theregister.com

    "Toyota said it had no evidence the data had been misused, and that it discovered the misconfigured cloud system while performing a wider investigation of Toyota Connected Corporation's (TC) cloud systems. TC was also the site of two previous Toyota cloud security failures: one identified in September 2022, and another in mid-May of 2023. As was the case with the previous two cloud exposures, this latest misconfiguration was only discovered years after the fact. T**oyota admitted in this instance that records for around 260,000 domestic Japanese service incidents had been exposed to the web since 2015**. The data lately exposed was innocuous if you believe Toyota – just vehicle device IDs and some map data update files were included. "

    2
    0
    [userscript] (grease/violent/tamper) *monkey script to reformat Lemmy's look and feel to old.reddit with RES
  • 0xCBE 0xCBE 1y ago 100%

    Maybe it's enough to make a pull request to the original CSS files here? I would guess the Lemmy devs would rather focus more on the backend right now

    1
  • airisk.io

    "database [...] specifically designed for organizations that rely on AI for their operations, providing them with a comprehensive and up-to-date overview of the risks and vulnerabilities associated with publicly available models."

    2
    0
    welcome
  • 0xCBE 0xCBE 1y ago 100%

    ahah thank you, we shall all yell together then

    1
  • Introduce yourself!
  • 0xCBE 0xCBE 1y ago 100%

    👋 infra sec blue team lead for a large tech company

    1