mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

595
comptes actifs

#offsec

0 message0 participant0 message aujourd’hui
Pen Test Partners<p>Microsoft Copilot for SharePoint just made recon a whole lot easier. 🚨<br>&nbsp;<br>One of our Red Teamers came across a massive SharePoint, too much to explore manually. So, with some careful prompting, they asked Copilot to do the heavy lifting...<br>&nbsp;<br>It opened the door to credentials, internal docs, and more.<br>&nbsp;<br>All without triggering access logs or alerts.<br>&nbsp;<br>Copilot is being rolled out across Microsoft 365 environments, often without teams realising Default Agents are already active.<br>&nbsp;<br>That’s a problem.<br>&nbsp;<br>Jack, our Head of Red Team, breaks it down in our latest blog post, including what you can do to prevent it from happening in your environment.<br>&nbsp;<br>📌Read it here: <a href="https://www.pentestpartners.com/security-blog/exploiting-copilot-ai-for-sharepoint/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/exploiting-copilot-ai-for-sharepoint/</span></a></p><p> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/OffSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffSec</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft365</span></a> <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharePoint</span></a> <a href="https://infosec.exchange/tags/MicrosoftCopilot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MicrosoftCopilot</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a></p>
Shawn Webb<p>Cool research by my coworkers at IOActive: <a href="https://www.wired.com/story/digital-license-plate-jailbreak-hack/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/digital-licens</span><span class="invisible">e-plate-jailbreak-hack/</span></a></p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
Shawn Webb<p>Current status: Building a <a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> 14-STABLE VM on the <a href="https://bsd.network/tags/Framework" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Framework</span></a> laptop specifically for offensive security research and development.</p><p>Hoping to finish work on a C2 framework that operates over the ptrace boundary.</p><p><a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Shawn Webb<p>I wonder if I could manipulate the process via <code>procfs</code>. Perhaps extract a payload into <code>/proc/self/mem</code> or something.</p><p><a href="https://bsd.network/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a></p>
Shawn Webb<p>What are some interesting files/directories to overwrite in an AWS Lambda execution environment?</p><p>I found an unsafe tarball extraction vulnerability in a customer's code, but I'm not the most familiar with AWS.</p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
Keith Hoodlet :verified: :donor:<p>🤣 OSCP+ 💰 </p><p><a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
Shawn Webb<p>I'm doing a security code review of a service that uses Smithy ( <a href="https://smithy.io/2.0/quickstart.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">smithy.io/2.0/quickstart.html</span><span class="invisible"></span></a> ).</p><p>This is the first time I've come across Smithy. Does anyone know of any security issues of Smithy models/code that I should be aware of?</p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://bsd.network/tags/codereview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codereview</span></a></p>
Lucid.H3X<p><a href="https://defcon.social/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> </p><p>Hi My name is Lucid.H3X im a Infosec nut! I love all things security and tech. My main interests are in WIFI and Cloud based Security as well AI since its the New cutting edge of the cyberworld not to mention I have a huge fascination for malware and how its made and works as well. I also enjoy playing old retro 8bit games It's kinda a problem. When I'm not studying for a cert or in some rabbit hole hacking and tinkering. You can find me most likely out and about at local furry meets or hanging out with my family. FOSS and Crypto supporter ❣️</p><p>If you love <a href="https://defcon.social/tags/wardriving" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wardriving</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/furry" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>furry</span></a> <a href="https://defcon.social/tags/retrogames" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retrogames</span></a> <a href="https://defcon.social/tags/retrogaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retrogaming</span></a> and all things <a href="https://defcon.social/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> and <a href="https://defcon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/osint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>osint</span></a> <a href="https://defcon.social/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> related then add me!</p><p>PS I'm a pretty big dork and tend to go on huge rants so be warned ahead of time nerds!</p><p>Stay Fluffy and Nerdy,</p><p>Lucid.H3X</p>
isecjobs.com => foorilla.com<p>HIRING: Technology Security Analyst / Oakville, Ontario, Canada</p><p>👉 <a href="https://infosec-jobs.com/J120395/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">infosec-jobs.com/J120395/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/infosecjobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecjobs</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/CyberCareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCareer</span></a> <a href="https://mastodon.social/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/cloudjobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudjobs</span></a> <a href="https://mastodon.social/tags/cyberjobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberjobs</span></a> <a href="https://mastodon.social/tags/jobsearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobsearch</span></a> <a href="https://mastodon.social/tags/techjobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>techjobs</span></a> <a href="https://mastodon.social/tags/hiring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hiring</span></a> <a href="https://mastodon.social/tags/CCSK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CCSK</span></a> <a href="https://mastodon.social/tags/Canada" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Canada</span></a> <a href="https://mastodon.social/tags/OntarioJobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OntarioJobs</span></a> <a href="https://mastodon.social/tags/Oakville" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oakville</span></a> <a href="https://mastodon.social/tags/NIST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NIST</span></a> <a href="https://mastodon.social/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="https://mastodon.social/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://mastodon.social/tags/CompTIA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CompTIA</span></a> <a href="https://mastodon.social/tags/XDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XDR</span></a> <a href="https://mastodon.social/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a> <a href="https://mastodon.social/tags/NDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NDR</span></a> <a href="https://mastodon.social/tags/WindowsDefender" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsDefender</span></a> <a href="https://mastodon.social/tags/AZ900" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AZ900</span></a> <a href="https://mastodon.social/tags/OffSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffSec</span></a> <a href="https://mastodon.social/tags/ISACA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISACA</span></a></p>
BSidesNYC<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@BSidesNYC" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>BSidesNYC</span></a></span> 0x03 Recap: In this session, François Proulx discusses what goes on behind the scenes of <a href="https://infosec.exchange/tags/supplychainattacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>supplychainattacks</span></a> through the lens of SLSA (Supply chain Levels for Software Artifacts), a threat model designed to tackle these emergent threats.</p><p><a href="https://www.youtube.com/watch?v=gpqLgEqp_jA" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=gpqLgEqp_j</span><span class="invisible">A</span></a></p><p><a href="https://infosec.exchange/tags/securityconference" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityconference</span></a> <a href="https://infosec.exchange/tags/learncybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>learncybersecurity</span></a> <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
Shawn Webb<p>It even works with processes that have entered Capabilities Mode.</p><p><a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://bsd.network/tags/Capsicum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Capsicum</span></a> <a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
Shawn Webb<p>Injecting a shared object anonymously over the ptrace boundary on <a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> via libhijack now works!</p><p><a href="https://github.com/SoldierX/libhijack/commit/18b4ad92c0e41e4b0711484b725646c3f04b51ba" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/SoldierX/libhijack/</span><span class="invisible">commit/18b4ad92c0e41e4b0711484b725646c3f04b51ba</span></a></p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
Shawn Webb<p>First <a href="https://bsd.network/tags/BSDCan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSDCan</span></a> paper submitted. Working on some code to submit a second presentation.</p><p>I'm a bit skeptical that I'll have the code ready in time for the second one. But if I do, it will be something you won't want to miss. :-)</p><p><a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
Shawn Webb<p>I'm not well-versed in the many intricacies of production memory controller hardware devices. For those memory controllers that support ECC RAM, do they usually provide a query interface granular enough to peek at cell parity data?</p><p>If so, would it at all make sense to use cell parity data as a communications side channel or out-of-band ephemeral storage?</p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
averagesecurityguy<p>It's been about a week since this happened so I'm probably cool-headed enough to talk about it. First a little background info.</p><p>A sales person from Offensive Security (<a href="https://www.offsec.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">offsec.com/</span><span class="invisible"></span></a>) has been trying to reach out to me for days. First by work email, which I ignored, then through my personal LinkedIn account, which I also ignored.</p><p>Then, last week, my son texts me and says, "some guy called me looking for you." I told him I was your son and he said he would try to email. I know that absolutely no one in my professional circle has my son's personal cell number, so I asked him to send me the number that called him.</p><p>I call the number back and it's the sales guy from Offensive Security. I immediately asked him how he got my son's number and found out it was part of a ZoomInfo (<a href="https://www.zoominfo.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">zoominfo.com/</span><span class="invisible"></span></a>) record for me. I told him to immediately delete any record he has with my son's information.</p><p>I then let him know in no uncertain terms that his company was using some shady data gathering practices if they had my son's cell number and because of that I will personally never do business with OffSec again. I also made it clear that he should never reach out to me again.</p><p>Even though I hold the <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> and <a href="https://infosec.exchange/tags/OSCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCE</span></a> certifications and even though they were a career changer for me and for my colleagues, I will no longer do business with their company.</p><p><a href="https://infosec.exchange/tags/OffSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffSec</span></a> <a href="https://infosec.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffensiveSecurity</span></a></p>
Shawn Webb<p>I just finished the introductory article on my new offensive security project, aptly named Offensive-OpenSSL:</p><p><a href="https://git.hardenedbsd.org/shawn.webb/articles/-/blob/master/infosec/offensive-openssl/2023-02-03_introduction/article.md" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">git.hardenedbsd.org/shawn.webb</span><span class="invisible">/articles/-/blob/master/infosec/offensive-openssl/2023-02-03_introduction/article.md</span></a></p><p><a href="https://bsd.network/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSL</span></a> <a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/HardenedBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HardenedBSD</span></a></p>
alexia<p>I am proud of myself because today I got my first root shell on a prod network! :blobfoxcomputerowonotice:</p><p>Some of you may remember back when I only dreamed of hacking for my day job. Many people supported me in various ways like by being welcoming and helpful, providing mentorship, and boosting my work/words. <a href="https://hachyderm.io/tags/InfosecTwitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfosecTwitter</span></a> (RIP) was a huge part of my journey. </p><p><a href="https://hachyderm.io/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://hachyderm.io/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://hachyderm.io/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
Chase :loading:<p>Always interesting to see blue teamers write up <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> tools I’ve written. I like how they spent time figuring our TCP packets out to write a snort rule. </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> </p><p><a href="https://www.trendmicro.com/en_us/research/22/k/deimosc2-what-soc-analysts-and-incident-responders-need-to-know.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendmicro.com/en_us/research/</span><span class="invisible">22/k/deimosc2-what-soc-analysts-and-incident-responders-need-to-know.html</span></a></p>
Bishop Fox<p>Just a few weeks until <span class="h-card"><a href="https://infosec.exchange/@cactuscon" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cactuscon</span></a></span> 11! We can't wait; <span class="h-card"><a href="https://infosec.exchange/@dnsprincess" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dnsprincess</span></a></span> is presenting, there will be plenty of 🦊 swag on hand, and you can chat with our team about <a href="https://infosec.exchange/tags/infosecjobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecjobs</span></a> at Bishop Fox or our industry-leading <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> solutions. <a href="https://bishopfox.com/events/cactuscon-11" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bishopfox.com/events/cactuscon</span><span class="invisible">-11</span></a></p>
tomchop<p>We're looking for interns to work with in Zürich over the summer on a variety of topics: <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a>, platform hardening, sandboxing and of course ✨<a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> ✨</p><p>The deadline for applications is pretty tight: Jan 20, so please submit soon!</p><p><a href="https://careers.google.com/jobs/results/139765941031314118-security-engineer-intern-2023/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">careers.google.com/jobs/result</span><span class="invisible">s/139765941031314118-security-engineer-intern-2023/</span></a></p><p><a href="https://infosec.exchange/tags/internship" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internship</span></a> <a href="https://infosec.exchange/tags/job" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>job</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a></p>