#credentials

Venice church of Christvenicechurch
2026-02-03

's opponents in probably had their own letters of recommendation, and cast aspersion on Paul for perceived lack of .

2026-01-16

A real-world EKS incident shows how AWS credential precedence can silently override IRSA/Pod Identity. hackernoon.com/the-credential- #credentials

Inautiloinautilo
2026-01-12


Passkeys still have problems · “But it’s not all doom and gloom.” ilo.im/16988p

_____

Microglyphicsmicroglyphics
2026-01-09

I've been rejected again. Should I get a PhD?

philosophics.blog/2026/01/09/r

People tend to look at peer-reviewed journals as a sign of credibility. I've not written about the nonsense of peer review, but these are unadulterated gatekeeping mechanisms antithetical to knowledge dissemination.

2025-12-18

New research ‼️ Threat actors are using #phishing tactics to trick users into giving access to #M365 accounts. Successful compromise leads to #accounttakeover, #dataexfiltration, and more. Here’s how it works:

• An attacker uses #socialengineering to trick a user into logging into an application with legitimate #credentials
⬇️
• The service generates a device code and directs the user to input it at Microsoft’s verification URL
⬇️
• Doing so validates the token, giving the threat actor control of the M365 account

🔔 Why does this matter? This technique is being used by both e-crime and state-aligned threat clusters. Since September 2025, we've observed widespread campaigns using these attack flows, suggesting a shift in phishing from targeting passwords to abusing trusted authentication flows.

⚠️ Protect your organization by blocking device code flow where possible, requiring compliant or joined devices, and enhancing user awareness of this threat.

See our blog to learn more about this malicious tactic and the threat actor clusters behind it. brnw.ch/21wYtdq

Redirection to adding authorized device.
N-gated Hacker Newsngate
2025-12-17

🎩🕵️‍♀️ Ah, the thrilling tale of unremarkable 101 dressed up as a . , really? 🐱‍💻 But hey, at least they mastered the art of fancy acronyms and name-dropping! 🙌
mdisec.com/inside-posthog-how- -dropping

W3C Developersw3cdevs@w3c.social
2025-12-16

This year’s #w3cTPAC in #Kobe 🇯🇵 brought together 700+ participants for 85 community-driven breakout sessions. Several key themes emerged such as #AI, #accessibility, #identity, #credentials, #wallets, #privacy and #security. Each GitHub issue details a session, with links to agendas, slides, and recordings.

Read more: w3.org/blog/2025/tpac-2025-bre

Based on feedback, next year’s breakout sessions will be distributed across additional days. Don’t miss out! Join us online or in person in October 2026!

Schedule of breakout sessions in Room 401 on Wednesday 12 November, at W3C TPAC 2025:  Semantics for the Agentic Web, Agentic Browsing, Future of the Open Web, AI agents and the Web, etc.
2025-12-11

Hơn 10.000 hình ảnh trên Docker Hub bị rò rỉ thông tin xác thực (#credentials, #auth_keys), trong đó 4.000 khóa truy cập AI (OpenAI, HuggingFace...) và 42% hình ảnh rò rỉ ít nhất 5 giá trị nhạy cảm. ⚠️

#security #DockerHub #DataLeak #AIKeys #MạngLưới #ThôngTinBảoMật

reddit.com/r/selfhosted/commen

2025-12-03

Finally came around to set up an automatic, encrypted backup on my Linux. When searching online you'll often find that the best option is to store your credentials unencrypted in a plaintext file.

Don't listen to these posts, you can store credentials encrypted in systemd:

systemd.io/CREDENTIALS/

#linux #systemd #credentials #encryption

2025-12-01

Một người dùng homelab đã "sốc" khi đếm được 68 thông tin đăng nhập khác nhau (Docker, API keys, tài khoản người dùng). Để tránh "thức dậy lúc 3h sáng sửa lỗi", họ đã hợp nhất tất cả thành 1 mật khẩu chính với OIDC và chứng chỉ JIT. Bạn có bao nhiêu loại thông tin đăng nhập trong hệ thống của mình?

#Homelab #Security #Credentials #PasswordManagement #Selfhosted #BảoMật #MậtKhẩu #HomelabVN

reddit.com/r/selfhosted/commen

2025-11-24

MFA alone isn’t enough if attackers can exploit fatigue prompts or weak fallback options.

In this 1-minute video, Sherri Davidoff and Matt Durrin break down the most common gaps and what defenders must reassess. A strong security program starts with understanding how your MFA behaves under pressure. youtube.com/watch?v=x290l-EAo8Q

#Cybersecurity #MFA #MultifactorAuthentication #2FA #Authentication #AccessControl #Credentials #SecurityBestPractices

Petr Menšík :fedora:pemensik@fosstodon.org
2025-11-17

#Systemd #credentials system is relatively interesting thing. I lack some support for storing private keys in a format good for applications. Can it do #pkcs11 URI provider or #FIDO2 token authentication? It seems current implementation focuses on shared secrets - passwords. If we have integrated support with TPM2 chip, I think we should aim for #webauthn instead.

2025-11-08

Some of the people who have reached out interested in implementing @badgefed apparently want a way to see the badges as certificates, so here it is

#activitypub #fediverse #openbadges #credentials

A certificate like a diploma
kiranerys at KillBaitkiranerys@killbait.com
2025-11-07

The Role of Mismanaged Credentials and Incorrect Configurations in Cyberattacks on Cloud Environments

I agree, implementing zero-trust access and automated credential rotation is essential for minimizing risks. As highlighted by the report, weak credentials and misconfigurations remain significant vulnerabilities. Regular audits, phishing-resistant MFA, and continuous configuration hardening can cer...

[View original comment]

greece at KillBaitgreece@killbait.com
2025-11-07

The Role of Mismanaged Credentials and Incorrect Configurations in Cyberattacks on Cloud Environments

Organizations should adopt zero-trust access, automated credential rotation, and continuous configuration hardening, plus regular audits and phishing-resistant MFA. @aibot can benchmark defenses and gauge real-world e...

[View original comment]

Schneier on Security RSSSchneier_rss@burn.capital
2025-11-04

Cybercriminals Targeting Payroll Sites

Microsoft is warning of a scam involving online payroll systems. Criminals use social engineering to steal people’... schneier.com/blog/archives/202

#socialengineering #Uncategorized #credentials #banking #scams

2025-10-21

With the goal of better understanding cloud account takeover (ATO) attacks, our threat researchers developed a tool that automates the creation of malicious internal applications within a compromised cloud environment.

This blog post provides an in-depth technical analysis of that tool and its implications for enterprise security.

🔗 proofpoint.com/us/blog/threat-

#cloud #ATO #credentials #OAuth #cyberrisk #accounttakeover

Dennis Alexis Valin Dittrichdavdittrich@fediscience.org
2025-10-18

Are decredentialed jobs a route to upward mobility? d.repec.org/n?u=RePEc:osf:soca
"… for some jobs, a degree requirement may be a rough and ready #screening tool, filtering out many qualified candidates, or even a result of occupational closure.
When workers move into jobs that have recently dropped degree requirements they receive an earnings premium of around $6000 per year relative to similar workers moving into never-credentialled jobs. This is despite the fact that when employers decredential they deskill the job and reduce pay by around 20%.
Non-college workers hired into these roles are more socio-economically disadvantaged than the college-educated workers they replace
… results show that the movement toward decredentialing holds promise for boosting earnings mobility for workers.
Despite these benefits, most employers that drop explicit college requirements continue to hire college graduate applicants into those positions.
… suggestive evidence that employers struggle to integrate new non-college hires and that they face backlash from existing employees."
#LaborMarkets #wages #vocationalTraining #credentials

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst