A few minutes ago on the live feed for #artemis I watched the astronaut with the tablet on his lap unlock it with a password of 3939. Hope they change it before the next flight.
A few minutes ago on the live feed for #artemis I watched the astronaut with the tablet on his lap unlock it with a password of 3939. Hope they change it before the next flight.
π΅οΈββοΈ Trust can break Anonymity β π
π― π£πππ‘πππ‘π π π£πππ¦πππ₯: ππ’π‘βπ§ πππ§ π₯ππ£ πππ§ π¬π’π¨ π₯πππ§ - πππππ’π§ π£ππ₯π¦π’π‘π¦ β¨π₯
The βas-a-service modelβ has become ubiquitous across the cybercrime ecosystem. Previously dominated by tight-knit, exclusive groups, cybercrime is now a distributed international marketplace of service providers and consumers. As a result, it is more resilient than ever, with the gaps left by law enforcement takedowns quickly filled by the next opportunistic teenager.
However, to operate effectively in this anonymous distributed economy, threat actors need to build a reputation to gain trust. Does this give us an opportunity?
In this presentation, Elliot Parsons discusses the importance of trust in the cybercrime ecosystem and walks through a real-world investigation involving a prominent phishing-as-a-service (PhaaS) provider. The case study illustrates that trust and OpSec do not mix, exposing threat actors to identification.
Elliot Parsons https://www.linkedin.com/in/elliot-parsons-4ba72140 is a cyber threat intelligence consultant at AmeXio. He is from New Zealand with a background in Financial Services, Technology Services and Government organisations. His expertise is in threat intelligence, threat hunting, reverse engineering, malware analysis, and incident response.
π
Conference Dates: 6β8 May 2026 | 09:00β18:00
π 14, Porte de France, Esch-sur-Alzette, Luxembourg
ποΈ Tickets: https://2026.bsides.lu/tickets/
π
Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/
#BSidesLuxembourg #Phishing #CyberCrime #OSINT #ThreatIntelligence #PhaaS #HackerLife
Here is another BSides Luxembourg 2026 announcement!
π» π¦πππ¨π₯ππ§π¬ ππ π£π₯ππ¦π¦ πππ₯ππ’πππ―π₯β¨ - Kirils Solovjovs ( @k )
Think you can bluff your way through a security talk with zero prep? Now is your chance! At Security Impress Karaoke, you'll be handed a totally random, security-themed slide deck youβve never seen before and have just 3 minutes to present it like a pro. This is all about having fun, thinking fast, and impressing the crowd with your creativity and/or chaos. Come take the podium and letβs see what youβve got!
Kirils Solovjovs https://www.linkedin.com/in/kirilssolovjovs/ is Latviaβs top white-hat hacker and IT policy activist with 10+ years in offensive security and command-line mastery.
π
Conference Dates: 6β8 May 2026 | 09:00β18:00
π 14, Porte de France, Esch-sur-Alzette, Luxembourg
ποΈ Tickets: https://2026.bsides.lu/tickets/
π
Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/
#BSidesLuxembourg #SecurityKaraoke #CyberHumor #PublicSpeaking #HackerLife
Okay I know I could simply repair the keyboard with the intermittent keyboard problem impacting a couple of keys by taking apart my HP Dev One and cleaning/fixing/replacing things which will fix the problem, but am I doing that?
Of course not. Instead I'm of course thinking about just upgrading the laptop and I am trying to use this scenario as an excuse to try and justify a new fancy laptop purchase.
If you run Sendmail for a domain and are under regular attack by APT actors, then boy oh boy I have a fun blog post for you! What? Just me?
Ah well, you might find it interesting nonetheless as it is a monitoring problem I needed solving, and managed to actually meet my own needs.
https://www.markloveless.net/blog/2025/11/13/apt-and-sendmail-monitoring
A flaw led to more, then equipment upgrades and then things accelerated. What critical systems were impacted? Well, my own. Yup, massive techno-drama on the #homelab front.
https://www.markloveless.net/blog/2025/10/29/network-updates
Itβs not a good rack rewiring day unless you scrape off some skin. But things are _slightly_ more secure.
I do appreciate the fact that many people are thrilled and excited to talk about the movie Hackers like they are. But when asked about it, they are typically shocked that I hated the film.
Yes it was in part that by comparison to the 1992 film Sneakers (and of course reality itself) it was wildly inaccurate, but as someone who remembers Eternal September* the film Hackers became its own version of that with a massive influx of newbies on security and hacker mailing lists and USENET channels saying "Teach me how to hack" who wanted instant results and would not respond well to pointers to papers and whatnot filled with technical details. "But I want to hack, not do homework!" was a reply I remember seeing that summed up a common feeling amongst newbs. Trying to explain that the film exaggerated and was fiction simply fell on deaf ears for many.
And that is why I hate the movie Hackers. Just remembering the film Sneakers that starred Robert Redford (RIP).
Fascinating report. Comment Crew was definitely already on my radar when I worked at MITRE, to the point that they were targeting NMRC as they had made the connection that my day job was MITRE. Not that I am saying that this confirms things disclosed to me in classified MITRE meetings, but this report from @kimzetter confirms a LOT for me. A fun read!
https://www.zetter-zeroday.com/how-the-infamous-apt-1-report-exposing-chinas-pla-hackers-came-to-be/
This is the first in a series of pieces Iβll publish that take an in-depth look at significant events, people and cases in security and surveillance from the past. If thereβs something you think would make a good topic for this series, reach out to me at countdowntozeroday@