Skip to content

The digital town square for the concert band community.

Connect with local ensembles, trade repertoire insights, and keep the pulse of the wind band world.

  • 0 Votes
    1 Posts
    0 Views
    RootShellR
    New playlist online: from malware analysis to ethical hacking demos. Check it out here https://www.youtube.com/playlist?list=PLXqx05yil_mf5bfaN_6dGkcXnNwpgaUbL#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse
  • 0 Votes
    1 Posts
    0 Views
    Brian Greenberg :verified:B
    The FCC forgot hotspots were a thing. They announced a ban on foreign-made consumer routers a month ago and had to update their FAQ to add MiFi devices and cellular home routers after the fact. That's not a minor oversight... it's the whole work-from-anywhere use case.Here's the part that should bother you. The only way to get an exemption is to commit to US-based manufacturing and submit a time-bound plan to get there. Netgear, eero, and Adtran got conditional approval, but it runs out October 1, 2027. There is no domestic consumer router industry to speak of right now. So the FCC has created a countdown clock against a factory floor that doesn't exist yet.A few things worth sitting with:- The Global Electronics Association pointed out that security vulnerabilities show up across products regardless of where they're made. Geography isn't the filter; code quality is.- The Covered List used to apply to specific companies flagged for specific reasons. Extending it to an entire product category means the government can now ban any internet-connected device made abroad by citing national security. Smartphones aren't included yet. "Yet" is doing a lot of work in that sentence.- The Register's headline from last month said it plainly: the country that put backdoors in Cisco routers to spy on the world is now banning foreign routers. I didn't write that. They did. But they're not wrong.If you're in security or IT leadership, watch the October 2027 date. That's when the conditional approvals expire, and if the manufacturing commitments aren't met, the options get ugly fast.https://www.theregister.com/2026/04/24/fcc_does_a_doubletake_adds/#Cybersecurity #FCC #NetworkSecurity #security #privacy #cloud #infosec
  • 0 Votes
    1 Posts
    0 Views
    technicalCISO💥​T
    BGP, the protocol that decides where internet traffic flows, still operates largely on trust. That creates opportunities for route leaks, hijacks, and outages that don’t require touching the target environment at all. https://technicalciso.com/bgp-blind-spots-part-1/ #CyberSecurity #NetworkSecurity #BGP #InternetInfrastructure #SecurityEngineering #CyberRisk
  • 0 Votes
    1 Posts
    0 Views
    The Zeek Network Security MonitorZ
    ICYMI: Seth's walkthrough on JA4 fingerprinting in Zeek covers JA4, JA4S, JA4H, JA4T, JA4SSH, and JA4D with installation and use cases.https://zeek.org/2026/01/how-to-use-ja4-network-fingerprints-in-zeek/#Zeek #NetworkSecurity #OpenSource
  • 0 Votes
    1 Posts
    0 Views
    The Zeek Network Security MonitorZ
    RE: https://infosec.exchange/@zeek/116336545933492571Quick tip from the newsletter: Zeek has a built-in script debugger. Check it out:#Zeek #NetworkSecurity #OpenSource