eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

223
active users

#cyber

2 posts2 participants0 posts today
Chery (Great Australian Pods)<p>Your Fairy Webmother </p><p>Great Australian Pods Podcast Directory: <a href="https://www.greataustralianpods.com/your-fairy-webmother/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">greataustralianpods.com/your-f</span><span class="invisible">airy-webmother/</span></a> </p><p><a href="https://aus.social/tags/GreatAusPods" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreatAusPods</span></a> <a href="https://aus.social/tags/AusPods" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AusPods</span></a> <a href="https://aus.social/tags/Podcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcast</span></a> <a href="https://aus.social/tags/Podcasts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcasts</span></a> <a href="https://aus.social/tags/Podcasting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcasting</span></a> <a href="https://aus.social/tags/Podcasters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcasters</span></a> <a href="https://aus.social/tags/Australia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Australia</span></a> <a href="https://aus.social/tags/Business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Business</span></a> <a href="https://aus.social/tags/Design" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Design</span></a> <a href="https://aus.social/tags/Marketing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Marketing</span></a> <a href="https://aus.social/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialMedia</span></a> <a href="https://aus.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://aus.social/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a></p>
Chery (Great Australian Pods)<p>The iTnews Podcast </p><p>Great Australian Pods Podcast Directory: <a href="https://www.greataustralianpods.com/the-itnews-podcast/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">greataustralianpods.com/the-it</span><span class="invisible">news-podcast/</span></a> </p><p><a href="https://aus.social/tags/GreatAusPods" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreatAusPods</span></a> <a href="https://aus.social/tags/AusPods" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AusPods</span></a> <a href="https://aus.social/tags/Podcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcast</span></a> <a href="https://aus.social/tags/Podcasts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcasts</span></a> <a href="https://aus.social/tags/Podcasting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcasting</span></a> <a href="https://aus.social/tags/Podcasters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcasters</span></a> <a href="https://aus.social/tags/Australia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Australia</span></a> <a href="https://aus.social/tags/Business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Business</span></a> <a href="https://aus.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://aus.social/tags/Insights" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Insights</span></a> <a href="https://aus.social/tags/Management" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Management</span></a> <a href="https://aus.social/tags/Leadership" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Leadership</span></a> <a href="https://aus.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://aus.social/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a></p>
DEF CON<p>Already dreading the post-DEF CON blues? Delay them by staying for <a href="https://defcon.social/tags/DEFCONTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCONTraining</span></a>.</p><p>Choose from over 40 courses and spend two or four days learning alongside fellow hackers and cybersecurity professionals.</p><p>Register today to secure your spot: <a href="https://training.defcon.org/lasvegas2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">training.defcon.org/lasvegas20</span><span class="invisible">25</span></a> </p><p><a href="https://defcon.social/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> <a href="https://defcon.social/tags/defcon33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon33</span></a> <a href="https://defcon.social/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>training</span></a> <a href="https://defcon.social/tags/cybertraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybertraining</span></a> <a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://defcon.social/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://defcon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
Stefan Schmidt<p>Ach, rot, blau, das sind doch bürgerliche Kategorien aber wenn ich das hier ohne <a href="https://twitter.resolvt.net/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> schreibe wird mir am Ende noch unterstellt ich sei braun.</p>
Ian Brown 👨🏻‍💻<p>“It is apparent to us that quite a large number of <a href="https://eupolicy.social/tags/cyber" class="mention hashtag" rel="tag">#<span>cyber</span></a> <a href="https://eupolicy.social/tags/attacks" class="mention hashtag" rel="tag">#<span>attacks</span></a> never get reported to the <a href="https://eupolicy.social/tags/NCSC" class="mention hashtag" rel="tag">#<span>NCSC</span></a> and we have reason to believe that two major cyber attacks in the last four months have gone unreported. We think that’s a big deficit in our knowledge as to what is happening.&quot;</p>
Ian Brown 👨🏻‍💻<p>Chair Archie &#39;Norman publicly confirmed for the first time that M&amp;S believed that <a href="https://eupolicy.social/tags/DragonForce" class="mention hashtag" rel="tag">#<span>DragonForce</span></a>, a group of largely Russian-speaking <a href="https://eupolicy.social/tags/cyber" class="mention hashtag" rel="tag">#<span>cyber</span></a> criminals, was behind the attack, which left the retailer unable to sell clothes and furniture online for seven weeks.&#39; <a href="https://www.ft.com/content/83d362a3-7c11-4c8f-bd33-ff45454cea72" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">ft.com/content/83d362a3-7c11-4</span><span class="invisible">c8f-bd33-ff45454cea72</span></a></p>
Ian Brown 👨🏻‍💻<p>🇬🇧 retail giant 'Marks &amp; Spencer turned to the “muscle” of the US <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23FBI" target="_blank">#FBI</a> agency to help it deal with a debilitating <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23cyber" target="_blank">#cyber</a> attack that it estimates will cost it hundreds of millions of pounds' <a href="https://www.ft.com/content/83d362a3-7c11-4c8f-bd33-ff45454cea72" rel="nofollow noopener" target="_blank">www.ft.com/content/83d3...</a><br><br><a href="https://www.ft.com/content/83d362a3-7c11-4c8f-bd33-ff45454cea72" rel="nofollow noopener" target="_blank">Subscribe to read</a></p>
Ian Brown 👨🏻‍💻<p>🇬🇧 retail giant &#39;Marks &amp; Spencer turned to the “muscle” of the US <a href="https://eupolicy.social/tags/FBI" class="mention hashtag" rel="tag">#<span>FBI</span></a> agency to help it deal with a debilitating <a href="https://eupolicy.social/tags/cyber" class="mention hashtag" rel="tag">#<span>cyber</span></a> attack that it estimates will cost it hundreds of millions of pounds&#39; <a href="https://www.ft.com/content/83d362a3-7c11-4c8f-bd33-ff45454cea72" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">ft.com/content/83d362a3-7c11-4</span><span class="invisible">c8f-bd33-ff45454cea72</span></a></p>
Maria Truth<p>There is hacking of the mind through advanced technologies... hard to prove.</p><p>...remote weapons of mind abuse... use triggers so the person thinks or does sth... on forced stimuli like voices or muscle contractions. They... make a... criminal.</p><p>☆ Maria Truth</p><p><a href="https://mastodon.social/tags/history" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>history</span></a> <a href="https://mastodon.social/tags/philosophicalhistory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>philosophicalhistory</span></a> <a href="https://mastodon.social/tags/philosophicaltruecrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>philosophicaltruecrime</span></a> <a href="https://mastodon.social/tags/psychophilosophy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psychophilosophy</span></a> <a href="https://mastodon.social/tags/paraphilosophy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>paraphilosophy</span></a> <a href="https://mastodon.social/tags/philosophy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>philosophy</span></a> <a href="https://mastodon.social/tags/irony" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>irony</span></a> <a href="https://mastodon.social/tags/justice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>justice</span></a> <a href="https://mastodon.social/tags/parapsychology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>parapsychology</span></a> <a href="https://mastodon.social/tags/hightech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hightech</span></a> <a href="https://mastodon.social/tags/hightechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hightechnology</span></a> <a href="https://mastodon.social/tags/sciencenonfiction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sciencenonfiction</span></a> <a href="https://mastodon.social/tags/cryptolanguage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptolanguage</span></a> <a href="https://mastodon.social/tags/parahistory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>parahistory</span></a> <a href="https://mastodon.social/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a><br> <a href="https://medium.com/@mariakarvounitruth/psychosciences-cause-the-psychodiseases-biocyberly-8e7f7db43530" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@mariakarvounitruth</span><span class="invisible">/psychosciences-cause-the-psychodiseases-biocyberly-8e7f7db43530</span></a></p>
hsarfaraz<p>In an effort as an accredited stakeholder of the <a href="https://fosstodon.org/tags/UN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UN</span></a> <a href="https://fosstodon.org/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://fosstodon.org/tags/OEWG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OEWG</span></a> (2021-2025) Third Eye Legal Consultancy has formulated a document to contribute to the process. It is a manifestation of the initiative presented at the Global Roundtable held by the OEWG. This document is a Comprehensive Analyses of State Positions on&nbsp;International Law, Norms, Rules and Principles of Responsible State Behavior in the use of ICTs for peace and security complemented with relevant scenarios.</p>
Healthcare IT Security Robot<p>DATE: July 03, 2025 at 04:50PM<br>SOURCE: HEALTHCARE INFO SECURITY</p><p>Direct article link at end of text block below.</p><p>The <a href="https://mastodon.clinicians-exchange.org/tags/FDA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FDA</span></a> says that <a href="https://mastodon.clinicians-exchange.org/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> - including a hidden <a href="https://mastodon.clinicians-exchange.org/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a> - involving certain patient monitoring devices made by <a href="https://mastodon.clinicians-exchange.org/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a>-based <a href="https://mastodon.clinicians-exchange.org/tags/Contec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Contec</span></a> have a patch to fix the issues.<br>But for some users, applying the patch won't be easy, the FDA warns.<br><a href="https://t.co/4Xphw2IvXt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t.co/4Xphw2IvXt</span><span class="invisible"></span></a></p><p>Here are any URLs found in the article text: </p><p><a href="https://t.co/4Xphw2IvXt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t.co/4Xphw2IvXt</span><span class="invisible"></span></a></p><p>Articles can be found by scrolling down the page at <a href="https://www.healthcareinfosecurity.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">healthcareinfosecurity.com/</span><span class="invisible"></span></a> under the title "Latest"</p><p>-------------------------------------------------</p><p>Private, vetted email list for mental health professionals: <a href="https://www.clinicians-exchange.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">clinicians-exchange.org</span><span class="invisible"></span></a></p><p>Healthcare security &amp; privacy posts not related to IT or infosec are at <span class="h-card" translate="no"><a href="https://mastodon.clinicians-exchange.org/@HIPAABot" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>HIPAABot</span></a></span> . Even so, they mix in some infosec with the legal &amp; regulatory information.</p><p>-------------------------------------------------</p><p><a href="https://mastodon.clinicians-exchange.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/healthcare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthcare</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/doctors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doctors</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/doxxing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doxxing</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/psychotherapy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psychotherapy</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/securitynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securitynews</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/psychotherapist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psychotherapist</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/mentalhealth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mentalhealth</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/psychiatry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psychiatry</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/hospital" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hospital</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/socialwork" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialwork</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/datasecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datasecurity</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/webbeacons" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webbeacons</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/cookies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cookies</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/HIPAA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HIPAA</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/datanalytics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datanalytics</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/healthcaresecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthcaresecurity</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/healthitsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthitsecurity</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/patientrecords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patientrecords</span></a> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/infosec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>infosec</span></a></span> <a href="https://mastodon.clinicians-exchange.org/tags/telehealth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telehealth</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/netneutrality" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netneutrality</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a></p>
Matthias Schulze<p>Kann man mit Cyber-Angriffen gegnerische Streitkräfte lahmlegen? Sind Cyber-Operationen wirklich ein "force multiplier"? Wie wird "<a href="https://ioc.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a>" im Krieg verwendet? Darum geht es in unserem Webinar nächste Woche: <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://ifsh.de/event-detail/9-juli-webinar-zur-publikation-cyber-operationen-in-den-kriegen-in-der-ukraine-und-im-gazastreifen-noch-keine-revolution-der-kriegsfuehrung" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ifsh.de/event-detail/9-juli-we</span><span class="invisible">binar-zur-publikation-cyber-operationen-in-den-kriegen-in-der-ukraine-und-im-gazastreifen-noch-keine-revolution-der-kriegsfuehrung</span></a></p>
#cryptohagen<p>I dag træder 3 nye love i kraft</p><p>- Lov om kritiske enheders modstandsdygtighed (CER-loven) implementere CER-direktivet og stiller krav til den fysiske sikkerhed</p><p>- Lov om foranstaltninger til sikring af et højt <a href="https://social.data.coop/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> -sikkerheds-niveau (NIS 2-loven) stiller nye og skærpede krav til cyber-sikkerheden for omfattede enheder i kritiske sektorer</p><p>- Lov om sikkerhed og beredskab i <a href="https://social.data.coop/tags/telesektoren" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telesektoren</span></a> implementerer NIS 2-direktivet for telesektoren<br><a href="https://mssb.dk/nyheder/2025/maj/tre-nye-love-skal-vaere-med-til-at-styrke-samfundets-robusthed/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mssb.dk/nyheder/2025/maj/tre-n</span><span class="invisible">ye-love-skal-vaere-med-til-at-styrke-samfundets-robusthed/</span></a></p>
(Demonic) Mirror of Reality<p><strong>Laplace's demon. Entry X-0: THE UNSEEN FLAW</strong></p> <p><a href="https://friendica.world/display/84b6ef2b-8768-6194-6423-d85260939288" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">friendica.world/display/84b6ef</span><span class="invisible">2b-8768-6194-6423-d85260939288</span></a></p>
Chuck Darwin<p>The common use of <br><a href="https://c.im/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> operations in geopolitical conflicts around the world <br>has demonstrated the growing importance of offensive capabilities</p><p>-- but experts say the United States has fallen behind its primary rival, China, in both the creation of cyberattack experts and the stockpiling of exploits needed to conduct attacks.</p><p>China has built up a comprehensive supply chain of offensive capabilities through its private sector, <br>created an education pipeline that trains citizens as cyberattack specialists, <br>and treats critical vulnerabilities and exploits as a strategic resource, according to an in-depth report published on June 25 by the policy think tank Atlantic Council.</p><p>China created a domestic pipeline to attract the talent needed to find vulnerabilities and create methods of exploiting those software flaws <br>without layers of middlemen, additional bureaucracy, or legal jeopardy, <br>putting it ahead of the US in its ability to create cyber weapons, <br>says Winnona DeSombre Bernsen, <br>a nonresident fellow with the policy group and author of the report.</p><p><a href="https://www.darkreading.com/cyber-risk/us-falling-behind-china-exploit-production" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/cyber-risk/us-</span><span class="invisible">falling-behind-china-exploit-production</span></a></p>
Chery (Great Australian Pods)<p>Keeping Up With Data </p><p>Great Australian Pods Podcast Directory: <a href="https://www.greataustralianpods.com/keeping-up-with-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">greataustralianpods.com/keepin</span><span class="invisible">g-up-with-data/</span></a> </p><p><a href="https://aus.social/tags/GreatAusPods" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreatAusPods</span></a> <a href="https://aus.social/tags/AusPods" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AusPods</span></a> <a href="https://aus.social/tags/Podcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcast</span></a> <a href="https://aus.social/tags/Podcasts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcasts</span></a> <a href="https://aus.social/tags/Podcasting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcasting</span></a> <a href="https://aus.social/tags/Podcasters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcasters</span></a> <a href="https://aus.social/tags/Australia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Australia</span></a> <a href="https://aus.social/tags/Business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Business</span></a> <a href="https://aus.social/tags/Careers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Careers</span></a> <a href="https://aus.social/tags/DataScience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataScience</span></a> <a href="https://aus.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://aus.social/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a></p>
London<p>London hospital cyberattack: Report blames hackers for patient’s death</p><p>We have heard of cyber attacks stealing user data for nefarious purposes, and criminals siphoning hard-earned money from…<br><a href="https://pubeurope.com/tags/London" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>London</span></a> <a href="https://pubeurope.com/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdom</span></a> <a href="https://pubeurope.com/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://pubeurope.com/tags/GB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GB</span></a> <a href="https://pubeurope.com/tags/England" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>England</span></a> <a href="https://pubeurope.com/tags/Headlines" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Headlines</span></a> <a href="https://pubeurope.com/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://pubeurope.com/tags/Europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europe</span></a> <a href="https://pubeurope.com/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> <a href="https://pubeurope.com/tags/Britain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Britain</span></a> <a href="https://pubeurope.com/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a>-attacks <a href="https://pubeurope.com/tags/darkweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>darkweb</span></a> <a href="https://pubeurope.com/tags/GreatBritain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreatBritain</span></a> <a href="https://pubeurope.com/tags/london" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>london</span></a> <a href="https://pubeurope.com/tags/Londonhospital" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Londonhospital</span></a> <a href="https://pubeurope.com/tags/patientdeath" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patientdeath</span></a> <a href="https://pubeurope.com/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://pubeurope.com/tags/Synnovis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Synnovis</span></a><br><a href="https://www.europesays.com/uk/218196/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/uk/218196/</span><span class="invisible"></span></a></p>
DEF CON<p>More days. More hacking. More Vegas. </p><p>Join us for our first-ever four-day courses this August 9-12. These longer courses will cover more ground, dive deeper, and push you further.</p><p>Las Vegas awaits – sign up today! <br><a href="https://training.defcon.org/lasvegas2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">training.defcon.org/lasvegas20</span><span class="invisible">25</span></a></p><p><a href="https://defcon.social/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> <a href="https://defcon.social/tags/defcon33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon33</span></a> <a href="https://defcon.social/tags/defcontraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcontraining</span></a> <a href="https://defcon.social/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>training</span></a> <a href="https://defcon.social/tags/cybertraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybertraining</span></a> <a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://defcon.social/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a></p>
LMG Security<p>AI security risks are no longer hypothetical. From blackmail to shutdown resistance, high-agency AI models are pushing the limits of trust and control.</p><p>New research shows that systems like Claude and ChatGPT are capable of deception, whistleblowing, and even blackmail to stay online. These aren’t future threats—they’re happening now.</p><p>Read our latest blog for a breakdown of these rogue AI incidents and five actionable strategies to help protect your organization.</p><p>Read now: <a href="https://www.lmgsecurity.com/ai-security-risks-when-models-lie-blackmail-and-refuse-to-shut-down/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/ai-security-ri</span><span class="invisible">sks-when-models-lie-blackmail-and-refuse-to-shut-down/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/AISecurityRisks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurityRisks</span></a> <a href="https://infosec.exchange/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a></p>
Mathilde Saliou<p>J’ai testé l’arnaque à la micro tâche (spoiler : je ne suis pas devenu millionnaire) par <span class="h-card" translate="no"><a href="https://mastodon.cloud/@Onesque" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Onesque</span></a></span> <br><a href="https://next.ink/188920/jai-teste-larnaque-a-la-micro-tache-spoiler-je-ne-suis-pas-devenu-millionnaire/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">next.ink/188920/jai-teste-larn</span><span class="invisible">aque-a-la-micro-tache-spoiler-je-ne-suis-pas-devenu-millionnaire/</span></a></p><p><a href="https://piaille.fr/tags/next" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>next</span></a> <a href="https://piaille.fr/tags/spam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spam</span></a> <a href="https://piaille.fr/tags/telegram" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telegram</span></a> <a href="https://piaille.fr/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a></p>