fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.6K
active users

#cyberresilience

3 posts2 participants0 posts today
Stefan Beyer<p>Feature update: Search queries in our CVE app can now be used as RSS feeds! Just follow the instructions at the bottom of the search page. It's really easy – promise ;-)</p><p><a href="https://ioc.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://ioc.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://ioc.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://ioc.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://ioc.exchange/tags/SoftwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SoftwareSecurity</span></a> <a href="https://ioc.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://ioc.exchange/tags/CyberAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAwareness</span></a> <a href="https://ioc.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://ioc.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://ioc.exchange/tags/CyberResilience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberResilience</span></a></p>
Pyrzout :vm:<p>From Prototype to Market Leader: Mapping the Web Development Lifecycle <a href="https://www.cm-alliance.com/cybersecurity-blog/from-prototype-to-market-leader-mapping-the-web-development-lifecycle" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cm-alliance.com/cybersecurity-</span><span class="invisible">blog/from-prototype-to-market-leader-mapping-the-web-development-lifecycle</span></a> <a href="https://social.skynetcloud.site/tags/cybercrisismanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrisismanagement</span></a> <a href="https://social.skynetcloud.site/tags/tabletopexercises" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tabletopexercises</span></a> <a href="https://social.skynetcloud.site/tags/cyberresilience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberresilience</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>

At the request of several users, our CVE web app has been available for installation on mobile devices and desktop computers since 9 September 2025.

However, the app does not have any offline functions, as this would require full synchronisation of the database to the device. Please let me know if this is something that you would really really want.

#Cyber #Security #CyberSecurity #SoftwareSecurity #Vulnerability #CISA #CVE #KEV #CyberAwareness #InfoSec #CyberThreats #CyberResilience

cve.threatint.eu

Why Your Security Team Needs Geographic Threat Intelligence Visualization 🗺️
Traditional security dashboards show you WHAT happened, but not WHERE it's happening or HOW threats are connected geographically. Your SOC analysts are drowning in isolated alerts while missing the bigger picture - attack campaigns that span multiple IPs and locations. This geographic blind spot is costing companies millions in delayed detection and response times.
🎯 Five Reasons to Use Geographic Threat Intelligence:
Faster Incident Response - See attack patterns immediately, not after hours of analysis
Better Resource Allocation - Focus security resources on high-risk geographic areas
Enhanced Threat Hunting - Spot attack campaigns across multiple IPs and locations
Improved Prioritization - Group related threats by geography and risk level
Better Communication - Show executives the threat landscape visually
Don't let your security team fight blind. Give them the geographic intelligence they need to win the battle against cyber threats.
#Cybersecurity #ThreatIntelligence #SOC #IncidentResponse #SecurityOperations #CyberDefense #ThreatHunting #SecurityAnalytics #InfoSec #CyberThreats #SecurityTools #DataVisualization #SecurityInnovation #CyberAwareness #SecurityLeadership #RiskManagement #SecurityMonitoring #ThreatDetection #CyberResilience #SecurityStrategy

chickenpwny.github.io/AzureOrd

chickenpwny.github.ioAzure Security Logs Visualization ToolInteractive threat intelligence mapping for Azure security logs with real-time risk assessment and connection analysis.