fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.6K
active users

#insomnihack

0 posts0 participants0 posts today
Insomni'hack<p>🇨🇭 Switzerland hosts one of Europe’s biggest CTFs!<br>🧠 700+ players, 30 challenges, 12h of hacking at <a href="https://infosec.exchange/tags/INSO25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>INSO25</span></a> in Lausanne.<br>We’re already counting down to 2026!<br>📸 Marine Garnier<br><a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://infosec.exchange/tags/Insomnihack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Insomnihack</span></a></p>
Linus Gasser<p>We saw some supply-chain attacks on Linux distrubtions during <a href="https://social.epfl.ch/tags/insomnihack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>insomnihack</span></a>. There an attacker would've been able to insert random code into packages. Now it seems to be the same for Fedora:</p><p><a href="https://fenrisk.com/pagure" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">fenrisk.com/pagure</span><span class="invisible"></span></a></p><p>Which makes me wonder why they went through all that trouble with the XZ Utils backdoor (<a href="https://en.wikipedia.org/wiki/XZ_Utils_backdoor" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/XZ_Utils</span><span class="invisible">_backdoor</span></a>)? The frontdoor seems to be wide open!</p>

#insomnihack 2025 - keynote from Mathias Payer. I always like if a researcher presents a slide like this in 30 seconds by going over it "something, something, something" :)

But as always very interesting and eye-opening what kind of (non-)security we're relying on daily.

🚨📢 Insomni'hack 2025

🚀 Since Monday, 5 workshops have launched this sixteenth edition with a wide range of topics such as Web Application Security, Windows Attack & Defense, Offensive Entra ID, AI Secure Ops or even Advanced Detection Engineering.

🛡️Join us tomorrow for the first day of talks at the SwissTech Convention Center.

Some practical information:
🕘 Doors open at: 8:30 AM.
🎟 Ticket: Please bring your registration confirmation (printed or digital).

👉 Check out the talk's program: insomnihack.ch/talks-2025/

👋 See you at Insomni'hack 2025!