{"id":596,"date":"2024-07-23T18:13:53","date_gmt":"2024-07-23T16:13:53","guid":{"rendered":"https:\/\/lendl.priv.at\/blog\/?p=596"},"modified":"2026-01-05T23:06:40","modified_gmt":"2026-01-05T22:06:40","slug":"browsertab-dump-2024-07-23","status":"publish","type":"post","link":"https:\/\/lendl.priv.at\/blog\/2024\/07\/23\/browsertab-dump-2024-07-23\/","title":{"rendered":"Browsertab Dump 2024-07-23"},"content":{"rendered":"\n<p>I keep accumulating pages in browser tabs that I should read and\/or remember, but sometimes it&#8217;s really time to clean up. So I&#8217;m trying something new: dump the links here in a blog post.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/docseuss.medium.com\/the-biggest-threat-facing-your-team-whether-youre-a-game-developer-or-a-tech-founder-or-a-ceo-is-8cd1ad359508\" data-type=\"URL\" data-id=\"https:\/\/docseuss.medium.com\/the-biggest-threat-facing-your-team-whether-youre-a-game-developer-or-a-tech-founder-or-a-ceo-is-8cd1ad359508\">the biggest threat facing your team, whether you&#8217;re a game developer or a tech founder or a CEO, is not what you think<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cyberpolicyhaus.com\/\" data-type=\"URL\" data-id=\"https:\/\/www.cyberpolicyhaus.com\/\">Cyber Policy Haus<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.interface-eu.org\/publications\/active-cyber-defense-toward-operational-norms\" data-type=\"URL\" data-id=\"https:\/\/www.interface-eu.org\/publications\/active-cyber-defense-toward-operational-norms\">Active Cyber Defense<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.nature.com\/articles\/s41586-024-07417-w.epdf?sharing_token=-H6ynotZUtnX9hqj5LZOfdRgN0jAjWel9jnR3ZoTv0PHjAsYY0GLhz9RBvciXVgSoZhMWcZmjAriBVc5wcGgxyPRW3cif8KFcfw5gbjfv51-ZGi0HTE487XUK8ujAV6e3ruze_axOif8S74p7QuvML01X1IhQ0I7V7D8M5cppWQ%3D\">Misunder<span class=\"_ _4 current-selection\"><\/span>st<span class=\"_ _4 current-selection\"><\/span>anding the harms of online<span class=\"_ _5 current-selection\"><\/span> misinf<span class=\"_ _6 current-selection\"><\/span>ormation<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/arxiv.org\/abs\/2401.09621v1\" data-type=\"URL\" data-id=\"https:\/\/arxiv.org\/abs\/2401.09621v1\">XTable in Action: Seamless Interoperability in Data Lakes<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/netzpolitik.org\/2024\/going-dark-eu-staaten-wollen-zugriff-auf-verschluesselte-daten-und-mehr-ueberwachung\/\" data-type=\"URL\" data-id=\"https:\/\/netzpolitik.org\/2024\/going-dark-eu-staaten-wollen-zugriff-auf-verschluesselte-daten-und-mehr-ueberwachung\/\">EU-Staaten wollen Zugriff auf verschl&uuml;sselte Daten und mehr &Uuml;berwachung<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.propublica.org\/article\/microsoft-solarwinds-golden-saml-data-breach-russian-hackers\" data-type=\"URL\" data-id=\"https:\/\/www.propublica.org\/article\/microsoft-solarwinds-golden-saml-data-breach-russian-hackers\">Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blueprint.asd.gov.au\/\" data-type=\"URL\" data-id=\"https:\/\/blueprint.asd.gov.au\/\">ASD&#8217;s Blueprint for Secure Cloud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/ctoatncsc.substack.com\/\" data-type=\"URL\" data-id=\"https:\/\/ctoatncsc.substack.com\/\">CTO at NCSC &#8211; Cyber Defence Analysis<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/organisations-considering-payment-in-ransomware-incidents\" data-type=\"URL\" data-id=\"https:\/\/www.ncsc.gov.uk\/guidance\/organisations-considering-payment-in-ransomware-incidents\">Guidance for organisations considering payment in ransomware incidents<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.heise.de\/news\/Kommentar-zur-Debatte-um-IT-Sicherheit-Die-Empoerten-sind-nackt-9708160.html\">Die Emp&ouml;rten sind nackt<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/openvpn.fox-it.com\/index.html\" data-type=\"URL\" data-id=\"https:\/\/openvpn.fox-it.com\/index.html\">OpenVPN for the Dutch Government<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/cyber-threats-global-elections\" data-type=\"URL\" data-id=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/cyber-threats-global-elections\">Poll Vaulting: Cyber Threats to Global Elections<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cloud.google.com\/blog\/topics\/public-sector\/cybershield-helping-governments-stand-united-against-cyber-attacks\/?hl=en\" data-type=\"URL\" data-id=\"https:\/\/cloud.google.com\/blog\/topics\/public-sector\/cybershield-helping-governments-stand-united-against-cyber-attacks\/?hl=en\">CyberShield: helping governments stand united against cyber attacks<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/products-on-your-perimeter\" data-type=\"URL\" data-id=\"https:\/\/www.ncsc.gov.uk\/blog-post\/products-on-your-perimeter\">Products on your perimeter considered harmful (until proven otherwise)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/jamesridgway\/attachment-downloader\" data-type=\"URL\" data-id=\"https:\/\/github.com\/jamesridgway\/attachment-downloader\">Attachment Downloader<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/public-exposure.inform.social\/post\/end-of-life-components\/\" data-type=\"URL\" data-id=\"https:\/\/public-exposure.inform.social\/post\/end-of-life-components\/\">End-of-Life Components &#8211; the Acedia of Information Technology<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/news.ycombinator.com\/item?id=41003390\">CrowdStrike thoughts<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cert.pl\/en\/posts\/2024\/07\/mailgoose\/\" data-type=\"URL\" data-id=\"https:\/\/cert.pl\/en\/posts\/2024\/07\/mailgoose\/\">MailGoose<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>I keep accumulating pages in browser tabs that I should read and\/or remember, but sometimes it&#8217;s really time to clean up. So I&#8217;m trying something new: dump the links here in a blog post.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-596","post","type-post","status-publish","format-standard","hentry","category-internet"],"_links":{"self":[{"href":"https:\/\/lendl.priv.at\/blog\/wp-json\/wp\/v2\/posts\/596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lendl.priv.at\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lendl.priv.at\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lendl.priv.at\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lendl.priv.at\/blog\/wp-json\/wp\/v2\/comments?post=596"}],"version-history":[{"count":1,"href":"https:\/\/lendl.priv.at\/blog\/wp-json\/wp\/v2\/posts\/596\/revisions"}],"predecessor-version":[{"id":804,"href":"https:\/\/lendl.priv.at\/blog\/wp-json\/wp\/v2\/posts\/596\/revisions\/804"}],"wp:attachment":[{"href":"https:\/\/lendl.priv.at\/blog\/wp-json\/wp\/v2\/media?parent=596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lendl.priv.at\/blog\/wp-json\/wp\/v2\/categories?post=596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lendl.priv.at\/blog\/wp-json\/wp\/v2\/tags?post=596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}