Advertisement · 728 × 90

Posts by Alex

Podcast cover image

Podcast cover image

🎧 New drop on the playlist!
Les fondamentaux de la cybersécurité by NoLimitSecu.

👉 Listen now:
https://open.spotify.com/episode/2jhU5m98DsSYLWL8UKuRbg

5 months ago 1 0 0 0
Podcast cover image

Podcast cover image

🎧 New drop on the playlist!
Risky Biz Soap Box: Prowler, the open cloud security platform by Patrick Gray.

👉 Listen now:
https://open.spotify.com/episode/4XoUigGqs6bVWCFUanM6F8

7 months ago 1 0 0 0
Preview
NASA hacked hardware of camera orbiting Jupiter – and fixed it Deliberate overheating brought relief to Juno probe’s camera, twice NASA has revealed that one of the cameras on the Juno craft it sent to Jupiter malfunctioned, and that it fixed it with some very, very, remote hardware hacking.…

NASA hacked hardware of camera orbiting Jupiter – and fixed it

8 months ago 48 13 0 1
Preview
Hackers exploit a blind spot by hiding malware inside DNS records Technique transforms the Internet DNS into an unconventional file storage system.
8 months ago 54 14 3 3
Preview
European alternatives to WeTransfer | European Alternatives WeTransfer is a file-sharing service from the United States.

For switching to EU/European alternatives for WeTransfer, see: european-alternatives.eu/alternative-...

8 months ago 79 29 2 6
Preview
SwissTransfer - Envoi sécurisé et gratuit de gros fichiers Envoyez jusqu'à 50 Go - Gratuit et sans inscription - Gardez vos transferts jusqu'à 30 jours.

I’ve been using SwissTransfer for 2 years, it’s free, keeps files online for 1 month instead of 15 days, and allows up to 50 GB by link. www.swisstransfer.com

8 months ago 14 3 0 1

WeTransfer just changed their TOS giving themselves permission to train AI on any content you transfer and produce derivative works based on content you transfer that they are allowed to monetize and you are not allowed payment for.

Stop using WeTransfer.

8 months ago 7582 5272 128 462
Preview
Blockchain Security Layers: Tradeoffs Between L1, L2, and Hardware TEEs

Blockchain Security Layers: Tradeoffs Between L1, L2, and Hardware TEEs #confidentialsmartcontracts

9 months ago 1 1 0 0
Preview
40% of AI-Generated Code Is Vulnerable. How to Protect Yours!

AI writes your code fast—but is it safe? This guide shows simple ways to avoid common security mistakes in AI-generated apps and projects. #aigeneratedcode

9 months ago 1 1 0 0
Preview
RIFT - New Open-Source Tool From Microsoft to Analyze Malware Hidden Within Rust Binaries

RIFT – New Open-Source Tool From Microsoft to Analyze Malware Hidden Within Rust Binaries

9 months ago 0 1 0 0
Advertisement
"An infographic illustrating a satellite communication system. It features various satellites in orbit, including a 'Trusted Satellite' and a 'Government Satellite,' connected to ground stations and mobile units. The image highlights different cybersecurity threat types and levels of sophistication, categorized by skills and methods, with a color-coded table on the right side detailing the threat levels and their corresponding categories."

"An infographic illustrating a satellite communication system. It features various satellites in orbit, including a 'Trusted Satellite' and a 'Government Satellite,' connected to ground stations and mobile units. The image highlights different cybersecurity threat types and levels of sophistication, categorized by skills and methods, with a color-coded table on the right side detailing the threat levels and their corresponding categories."

Cybersécurité dans l'espace : comment protéger nos satellites des nouvelles menaces ?
www.futura-sciences.com/sciences/act...

9 months ago 1 0 0 0
Preview
Hardening GitHub Actions: Lessons from Recent Attacks | Wiz Blog Build resilient GitHub Actions workflows with insights from real attacks, missteps to avoid, and security tips GitHub’s docs don’t fully cover.

How to Harden #GitHub Actions www.wiz.io/blog/github-...

9 months ago 1 0 0 0
Security BSides Cayman Islands – … Coming In 2025

Security #BSides Cayman Islands | September 17-19

Get your Tickets => bsides.ky

9 months ago 0 0 0 0
Podcast cover image

Podcast cover image

🎧 New drop on the playlist!
[Tour de France de la Cyber] Nouvelle-Calédonie : la cyber dans le Pacifique by Leslie Fornero.

👉 Listen now:
https://open.spotify.com/episode/5iwRpbAHcHrrqCy2x7viyV

9 months ago 0 0 0 0
Post image

Nouvelle décision rappelant que la non conformité au #RGPD est un motif de résolution du contrat de développement de site Internet. Ici l'agence & société de financement condamnées à restituer les montants perçus.
(CA Bordeaux, 11/06/2025, 23/02206)
www.courdecassation.fr/decision/684...

9 months ago 7 3 0 0

Jean Kevin ou Jean-Michel citations ?

Mais je plussois :)

9 months ago 1 1 0 0
Podcast cover image

Podcast cover image

🎧 New drop on the playlist!
Migrating from “Tick Box" Compliance to Automating GRC in a Multi-Cloud World by Cloud Security Podcast Team.

👉 Listen now:
https://open.spotify.com/episode/4juW1ZypQmSUZLSvmHg8iC

9 months ago 0 0 0 0
The Power of Tiny Habits in Cybersecurity and IT Mastery Introduction: In the fast-evolving fields of cybersecurity, AI, and IT, success isn’t just about grand breakthroughs—it’s built on consistent, incremental improvements. Small, daily habits—like mastering a command, reviewing logs, or testing a vulnerability—compound into expertise over time. Here’s how to apply this philosophy to technical skills. Learning Objectives: Master foundational commands for Linux/Windows security. Implement tiny but critical habits for system hardening.

The Power of Tiny Habits in Cybersecurity and IT Mastery

Introduction: In the fast-evolving fields of cybersecurity, AI, and IT, success isn’t just about grand breakthroughs—it’s built on consistent, incremental improvements. Small, daily habits—like mastering a command, reviewing logs, or testing…

9 months ago 1 1 0 0
Advertisement
Preview
leHACK 2024 incoming! - leHACK false

#LeHACK revient à la @citedessciences.bsky.social à #Paris pour deux jours de hacking éthique intense, avec des sessions rumps, un village pour les jeunes

- Vendredi 5 Juillet de 10:30 Ă  21:00
- Toute la journée du Samedi 6
au Dimanche 7 juillet 2024 Ă  06:00

lehack.org

9 months ago 1 0 0 0
Preview
Beyond Bluesky: These are the apps building social experiences on the AT Protocol | TechCrunch A year ago, Bluesky was opening up to the public and was known as one of the many X competitors that emerged after Elon Musk acquired the network formerly

Beyond Bluesky: These are the apps building social experiences on the AT Protocol techcrunch.com/2025/...

9 months ago 518 149 29 22
Preview
There’s another leak on the ISS, but NASA is not saying much about it A crew mission has been delayed until next Wednesday at the earliest.

Multiple sources have confirmed to Ars that the leak is a serious concern for NASA as it deals with hardware that is approaching three decades in orbit.

9 months ago 160 56 4 3
Preview
OAuth Improvements | Bluesky We've been making improvements to the end-user and developer experiences with atproto OAuth, and wanted to share some updates.

OAuth updates for app devs!

Over the past few weeks we've been chatting with devs and doing a pass over our SDKs and docs to address issues. This blog post summarizes the main changes we've made, some tweaks still in flight, and links to longer form writing about security and design trade-offs

9 months ago 613 108 32 6
Preview
Vanta bug exposed customers' data to other customers | TechCrunch The compliance company said the customer data exposure was caused by a product change.

Vanta bug exposed customers’ data to other customers

10 months ago 7 1 1 1
Video

It is likely that quantum computers will soon be able to break the encryption methods that secure your passwords and anything else kept under digital lock and key. Here's a little demonstration, purely for illustrative purposes, to give a better sense.

Test it out now: wrd.cm/3T7TtUO

10 months ago 352 104 47 69
Preview
The EU’s “Encryption Roadmap” Makes Everyone Less Safe EFF has joined more than 80 civil society organizations, companies, and cybersecurity experts in signing a letter urging the European Commission to change course on its recently announced “Technology ...

#EFF has joined more than 80 civil society organizations, companies, and cybersecurity experts in signing a letter urging the #EuropeanCommission to change course on its recently announced “Technology Roadmap on Encryption.”

www.eff.org/deeplinks/20...

9 months ago 0 0 0 0
Preview
DNS4EU For Public Discover comprehensive information on the DNS4EU public resolver services. Compare available options, learn about features, and find answers to frequently asked questions to optimize your DNS privacy ...

The European Commission has just launched #DNS4EU, a public DNS resolver intended as a European alternative to services like Google’s Public #DNS resolver and Cloudflare’s DNS resolver.

www.joindns4.eu/for-public
www.joindns4.eu/dns-guidelines

9 months ago 1 1 0 1
Advertisement
Preview
Wireshark • Announcing the Wireshark Certified Analyst (WCA) Certification Wireshark: The world's most popular network protocol analyzer

Announcing the #Wireshark Certified Analyst (WCA) Certification www.wireshark.org/blog/2025-06...

10 months ago 0 0 0 0

La #CNIL publie une analyse sur l’impact économique du #RGPD en matière de cybersécurité, qui aurait permis d’éviter sur l’enjeu d’usurpation d’identité entre 90 et 219 millions € de préjudices cyber en France.

www.cnil.fr/sites/cnil/f...

10 months ago 0 1 0 0
Podcast cover image

Podcast cover image

🎧 New drop on the playlist!
#25 Un CERT pour protéger notre santé - Emmanuel Sohier & Quentin Le Thiec by Leslie Fornero.

👉 Listen now:
https://open.spotify.com/episode/3U4z1aSJh0G1CxDBeJvfBO

10 months ago 0 0 0 0