fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

9.9K
active users

#hids

0 posts0 participants0 posts today
Helmholtz Metadata Collab.<p>Truly an inspiring event! 🙌</p><p>Some of our <a href="https://helmholtz.social/tags/HMC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HMC</span></a> colleagues also had the chance to join the Incubator Workshop at <span class="h-card" translate="no"><a href="https://helmholtz.social/@DESYnews" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>DESYnews</span></a></span> – and they truly enjoyed the vibrant exchange between the <a href="https://helmholtz.social/tags/HIDS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HIDS</span></a> platforms. That collaborative spirit is what the Incubator is all about!</p><p>A heartfelt thank-you to Otmar D. Wiestler for his visionary leadership and for making initiatives like HMC possible. It’s an honor to be part of this amazing community.</p><p><a href="https://helmholtz.social/tags/Helmholtz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Helmholtz</span></a> <a href="https://helmholtz.social/tags/HIDS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HIDS</span></a> <a href="https://helmholtz.social/tags/HMC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HMC</span></a> <a href="https://helmholtz.social/tags/IncubatorWorkshop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncubatorWorkshop</span></a></p>
Helmholtz Imaging<p>On April 14-15 researchers, <a href="https://helmholtz.social/tags/HIDS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HIDS</span></a> Platforms representatives, &amp; strategic thinkers from across <span class="h-card" translate="no"><a href="https://helmholtz.social/@association" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>association</span></a></span> gathered at <span class="h-card" translate="no"><a href="https://helmholtz.social/@DESYnews" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>DESYnews</span></a></span> for the spring edition of the Helmholtz Incubator Workshop. </p><p>Find out why it marked a special occasion for Prof. Dr. Otmar D. Wiestler, President of the Helmholtz Association, in our article 👉 <a href="https://helmholtz-imaging.de/news/spring-edition-of-the-helmholtz-incubator-workshop-at-desy/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">helmholtz-imaging.de/news/spri</span><span class="invisible">ng-edition-of-the-helmholtz-incubator-workshop-at-desy/</span></a></p><p><span class="h-card" translate="no"><a href="https://helmholtz.social/@helmholtz_hmc" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>helmholtz_hmc</span></a></span></p>
merlin / alex glow<p>Had an awesome time interviewing Tom for <a href="https://chaos.social/tags/HacksterCafe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HacksterCafe</span></a> ! The SPOKE board launches soon on KS: <a href="https://www.kickstarter.com/projects/tomfox/spoke-touch-sensing-made-simple" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">kickstarter.com/projects/tomfo</span><span class="invisible">x/spoke-touch-sensing-made-simple</span></a></p><p>It's a gorgeous and simple platform for touch-responsive <a href="https://chaos.social/tags/music" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>music</span></a> instruments, <a href="https://chaos.social/tags/HIDs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HIDs</span></a>, <a href="https://chaos.social/tags/InteractiveArt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InteractiveArt</span></a> pieces, &amp; other interfaces, good for <a href="https://chaos.social/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> beginners (similar to MakeyMakey and Bare Conductive Touch Board – we dug into the differences on video). Based on <a href="https://chaos.social/tags/RaspberryPi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RaspberryPi</span></a> <a href="https://chaos.social/tags/RP2040" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RP2040</span></a>, it has 27 capacitive sensors w/ indicator LEDs &amp; STEMMA QT / Qwiic! 🤩 <a href="https://mastodon.social/@TomVulpes/113867600268019530" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.social/@TomVulpes/113</span><span class="invisible">867600268019530</span></a></p>
Dragone2 :linuxmint:<p>Manteniamo il nostro <a href="https://mastodon.uno/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> <a href="https://mastodon.uno/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> protetto grazie ad un <a href="https://mastodon.uno/tags/HIDS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HIDS</span></a> (Host Intrusion Detection System) che intraprende azioni al nostro posto in automatico con <a href="https://mastodon.uno/tags/OSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSSEC</span></a>: </p><p><a href="https://www.risposteinformatiche.it/come-proteggere-linux-con-ossec-hids/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">risposteinformatiche.it/come-p</span><span class="invisible">roteggere-linux-con-ossec-hids/</span></a></p><p><a href="https://mastodon.uno/tags/UnoLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnoLinux</span></a> <a href="https://mastodon.uno/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.uno/tags/gnu_linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gnu_linux</span></a> <a href="https://mastodon.uno/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> <a href="https://mastodon.uno/tags/ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ubuntu</span></a> <a href="https://mastodon.uno/tags/raspberrypi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>raspberrypi</span></a> <a href="https://mastodon.uno/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.uno/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.uno/tags/tutorial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tutorial</span></a></p>
Cedric<p>I released a new version of pyHIDS with few fixes and a couple of improvements:<br /><a href="https://github.com/cedricbonhomme/pyHIDS" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">github.com/cedricbonhomme/pyHI</span><span class="invisible">DS</span></a></p><p>This tool is a HIDS (host-based intrusion detection system) and can help you to detect unauthorized file changes.</p><p>Thanks to various modules (such as MISP and Pandora) you can as well use it in order to detect malicious files.</p><p><a href="https://fosstodon.org/tags/hids" class="mention hashtag" rel="tag">#<span>hids</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://fosstodon.org/tags/python" class="mention hashtag" rel="tag">#<span>python</span></a> <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="tag">#<span>OpenSource</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/integrity" class="mention hashtag" rel="tag">#<span>integrity</span></a></p>
GeneBean<p>Hey <a href="https://fosstodon.org/tags/InfoSec" class="mention hashtag" rel="tag">#<span>InfoSec</span></a> peeps: what <a href="https://fosstodon.org/tags/hids" class="mention hashtag" rel="tag">#<span>hids</span></a> / host-based intrusion detection systems do you all suggest these days? I interested in covering <a href="https://fosstodon.org/tags/Windows" class="mention hashtag" rel="tag">#<span>Windows</span></a>, <a href="https://fosstodon.org/tags/macOS" class="mention hashtag" rel="tag">#<span>macOS</span></a>, &amp; <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="tag">#<span>Linux</span></a>. <br />[ <a href="https://fosstodon.org/tags/InfosecCommunity" class="mention hashtag" rel="tag">#<span>InfosecCommunity</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://fosstodon.org/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a> ]</p>
Taylor Parizo<p>Labs are fun. You go in planning to do task A then realize a monitor isn't working so you fix that which requires sub-tasks A-F and once you're done, it's too late to go back and start task A.</p><p>At least the service is using the correct XML config now and I built a custom MSI package that can distribute the install amongst all hosts 🤷 <br><a href="https://infosec.exchange/tags/Homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Homelab</span></a> <a href="https://infosec.exchange/tags/HIDS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HIDS</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a></p>
Cedric<p>The new version of pyHIDS features the integration Hashlookup and Pandora.</p><p><a href="https://github.com/cedricbonhomme/pyHIDS" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">github.com/cedricbonhomme/pyHI</span><span class="invisible">DS</span></a></p><p><a href="https://fosstodon.org/tags/hids" class="mention hashtag" rel="tag">#<span>hids</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://fosstodon.org/tags/python" class="mention hashtag" rel="tag">#<span>python</span></a></p>
Cedric<p>pyHIDS a very light HIDS written in Python:</p><p><a href="https://github.com/cedricbonhomme/pyHIDS" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">github.com/cedricbonhomme/pyHI</span><span class="invisible">DS</span></a></p><p><a href="https://fosstodon.org/tags/python" class="mention hashtag" rel="tag">#<span>python</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://fosstodon.org/tags/hids" class="mention hashtag" rel="tag">#<span>hids</span></a> <a href="https://fosstodon.org/tags/system" class="mention hashtag" rel="tag">#<span>system</span></a> <a href="https://fosstodon.org/tags/linux" class="mention hashtag" rel="tag">#<span>linux</span></a></p>
FOSSlife<p>Matthias Wübbeling explains various sources of threat intelligence and how to use the information to improve your organization&#39;s security <a href="https://www.fosslife.org/understanding-threat-intelligence-infrastructure-security" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">fosslife.org/understanding-thr</span><span class="invisible">eat-intelligence-infrastructure-security</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://fosstodon.org/tags/tools" class="mention hashtag" rel="tag">#<span>tools</span></a> <a href="https://fosstodon.org/tags/infrastructure" class="mention hashtag" rel="tag">#<span>infrastructure</span></a> <a href="https://fosstodon.org/tags/networking" class="mention hashtag" rel="tag">#<span>networking</span></a> <a href="https://fosstodon.org/tags/SystemAdministration" class="mention hashtag" rel="tag">#<span>SystemAdministration</span></a> <a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="tag">#<span>firewall</span></a> <a href="https://fosstodon.org/tags/NIDS" class="mention hashtag" rel="tag">#<span>NIDS</span></a> <a href="https://fosstodon.org/tags/HIDS" class="mention hashtag" rel="tag">#<span>HIDS</span></a></p>
OPSEC Cybersecurity News Live<p>How to find out what the subnet is that is attacking me <br> <br> <a href="https://security.stackexchange.com/questions/267204/how-to-find-out-what-the-subnet-is-that-is-attacking-me" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.stackexchange.com/que</span><span class="invisible">stions/267204/how-to-find-out-what-the-subnet-is-that-is-attacking-me</span></a> <br> <br> <a href="https://aspiechattr.me/tags/hids" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hids</span></a> <a href="https://aspiechattr.me/tags/ip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ip</span></a></p>
Michael Starks, Logsta🪵<p>If your SIEM supports them, make liberal use of lists for your rule tuning and enrichment. Separating the rule logic from the tuning means you can delegate some responsibility to analysts without risking the rule logic itself. <a href="https://noc.social/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a> <a href="https://noc.social/tags/logs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>logs</span></a> <a href="https://noc.social/tags/HIDS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HIDS</span></a></p>
Tony Perez<p>Put together a new script to automate how I install my <a href="https://noc.social/tags/ossec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ossec</span></a> agents on my web servers... what else should I add? <a href="https://noc.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://noc.social/tags/hids" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hids</span></a> <a href="https://noc.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://github.com/perezbox/script-public/blob/main/OSSEC/install-ossecagent.sh" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/perezbox/script-pub</span><span class="invisible">lic/blob/main/OSSEC/install-ossecagent.sh</span></a></p>