flipboard.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Welcome to Flipboard on Mastodon. A place for our community of curators and enthusiasts to inform and inspire each other. If you'd like to join please request an invitation via the sign-up page.

Administered by:

Server stats:

1.2K
active users

#digitalsecurity

1 post1 participant0 posts today

😱 Oh no! The Cookie Monster's gone digital! 🍪 Four million users now face a cookie-geddon because they dared to use "Secure Annex" — a name clearly crafted by the Department of #Redundancy Department. 🚨 Turns out, trusting extensions with security is like hiring a fox to guard the henhouse. 🦊🔒
secureannex.com/blog/searching #CookieMonster #DigitalSecurity #CookieGeddon #TrustIssues #HackerNews #ngated

Searching for something unknow
Secure Annex · Searching for something unknow30+ hidden browser extensions put 4,000,000 users at risk of cookie exposure

>> Seeding change: Supporting Palestinian human rights defenders through digital security

“As the war unfolded, I realised the importance of digital security for protecting our activism and staying safe online,” one of the participants in the digital security training organised by @7amleh said.

On our #SeedingChange column:

apc.org/en/blog/seeding-change

🚨 Cybersecurity Challenge Time! 🚨
Can you crack this one? 🧠👇

Which one is not the part of Penetration Testing?

1. Firewall Penetration Testing
2. Server Penetration Testing
3. Database Penetration Testing
4. Network Performance Monitoring

Drop your answer in the comments! 💬
Let’s see who’s really got that hacker mindset! 💻🔍

Tag a friend who should get this right! 😉

📞8368543123
🌐www.securiumacademy.com

Ah yes, the exciting tale of how Cloudflare's security features are single-handedly reshaping Europe's digital destiny! 🛡️ Apparently, the grand master plan to overhaul the entire continent's tech stack begins with the thrilling adventure of getting blocked by a website. 🎉 Who knew geopolitics was this entertaining?
spark.temrel.com/p/the-great-u #Cloudflare #Europe #DigitalSecurity #TechGeopolitics #Innovation #HackerNews #ngated

How new US tariffs are forcing Europe to rethink its entire tech stack.
TemrelThe Great UnstackingHow new US tariffs are forcing Europe to rethink its entire tech stack.

Apple Strengthens Security for Older Devices with Zero-Day Patches

Apple has rolled out critical security updates that backport fixes for actively exploited zero-day vulnerabilities to older versions of its operating systems, alongside updates for the latest stable versions of iOS, iPadOS, and macOS.

These updates are aimed at protecting older devices, many of which would not typically receive these patches. Apple’s commitment to security is evident in its efforts to ensure that users with older devices still have access to essential protections.

Key Vulnerabilities Addressed:

CVE-2025-24200: A flaw that allowed mobile forensic tools to disable 'USB Restricted Mode' on locked devices. Fixed in iOS 18.3.1 and iPadOS 18.3.1 (released February 2025).

CVE-2025-24201: A WebKit flaw that allowed attackers to break out of the Web Content sandbox, which was exploited in highly sophisticated attacks. Fixed in iOS 18.3.2, iPadOS 18.3.2, and macOS Sequoia 15.3.2 (released March 2025).

CVE-2025-24085: A privilege escalation flaw in Apple’s Core Media framework. Fixed in iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3 (January 2025).

Additionally, Apple has released a series of updates for its latest software, including iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, and Safari 18.4, addressing dozens of security flaws.

These patches help mitigate a wide range of vulnerabilities, from privilege escalation to arbitrary code execution, ensuring both older and newer devices remain protected.

Why this matters:

Zero-day vulnerabilities are particularly dangerous because they can be exploited before the software developer has a chance to release a fix.

Apple’s efforts to backport fixes for older devices ensure that users who may not be upgrading their hardware regularly still benefit from essential security protections.

Make sure to update your devices to ensure you're protected from these actively exploited threats.

Important Update in Email Security

Google has just announced a new End-to-End Encryption (E2EE) feature for Gmail business users, making it easier to send encrypted emails to any recipient.

With this update, businesses can now send fully encrypted emails to anyone, regardless of the email service they use, without having to worry about the complexities of certificates. While businesses can still configure the S/MIME protocol for digitally signed and encrypted messages, the new Gmail model offers a much simpler and more accessible solution.

Key Benefits:

Encryption is easily activated, requiring minimal setup and effort for both IT teams and end users.

The solution ensures better control over data security and privacy.

Fully compatible with any Gmail user, whether business or personal, enabling secure email communication across platforms.

For recipients who don’t use Gmail, they will receive a link to view the email securely, without needing a Google account.

This feature is powered by Client-Side Encryption (CSE), which allows businesses to manage their own encryption keys, ensuring that data is encrypted before being sent to Google’s servers. This method is crucial for meeting regulatory requirements such as HIPAA, data sovereignty, and other compliance standards.

CSE has been available to select Google Workspace customers since 2023 and is now expanding to Gmail on the web. By the end of this year, any Gmail user will be able to send and receive end-to-end encrypted emails.

With this update, Gmail is better equipped to ensure privacy and security in business communications.

#CyberSecurity #DataPrivacy #GoogleWorkspace #EmailEncryption #Compliance #DigitalSecurity

linkedin.com/posts/techbillyan

🎉 Congratulations, Apple users! Your precious bookmarks—those sacred hieroglyphs of your digital life—are now available for all to see thanks to CVE-2025-24259! 🍏🤷‍♂️ But fear not, you can always update your Mac, and while you're at it, enjoy scrolling through 131 riveting CVEs—because who doesn't love a good bedtime story? 📚💻💤
wts.dev/posts/bookmarks-leak/ #AppleBookmarks #CVE202524259 #cybersecurity #MacUpdate #digitalsecurity #HackerNews #ngated

A large purple letter W on a light tan background
Watch This SpaceCVE-2025-24259: Leaking Bookmarks on macOS | Watch This SpaceA security research blog.