A few minutes ago on the live feed for #artemis I watched the astronaut with the tablet on his lap unlock it with a password of 3939. Hope they change it before the next flight.

#nasa #space #HackerLife #infosec

πŸ•΅οΈβ€β™‚οΈ Trust can break Anonymity βœ…πŸ”

🎯 π—£π—›π—œπ—‘π——π—œπ—‘π—š 𝗔 π—£π—›π—œπ—¦π—›π—˜π—₯: 𝗗𝗒𝗑’𝗧 π—Ÿπ—˜π—§ π—₯π—˜π—£ π—šπ—˜π—§ 𝗬𝗒𝗨 π—₯π—˜π—žπ—§ - π—˜π—Ÿπ—Ÿπ—œπ—’π—§ 𝗣𝗔π—₯𝗦𝗒𝗑𝗦 ✨πŸ”₯

The β€œas-a-service model” has become ubiquitous across the cybercrime ecosystem. Previously dominated by tight-knit, exclusive groups, cybercrime is now a distributed international marketplace of service providers and consumers. As a result, it is more resilient than ever, with the gaps left by law enforcement takedowns quickly filled by the next opportunistic teenager.

However, to operate effectively in this anonymous distributed economy, threat actors need to build a reputation to gain trust. Does this give us an opportunity?

In this presentation, Elliot Parsons discusses the importance of trust in the cybercrime ecosystem and walks through a real-world investigation involving a prominent phishing-as-a-service (PhaaS) provider. The case study illustrates that trust and OpSec do not mix, exposing threat actors to identification.

Elliot Parsons https://www.linkedin.com/in/elliot-parsons-4ba72140 is a cyber threat intelligence consultant at AmeXio. He is from New Zealand with a background in Financial Services, Technology Services and Government organisations. His expertise is in threat intelligence, threat hunting, reverse engineering, malware analysis, and incident response.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #Phishing #CyberCrime #OSINT #ThreatIntelligence #PhaaS #HackerLife

Here is another BSides Luxembourg 2026 announcement!

πŸ’» π—¦π—˜π—–π—¨π—₯π—œπ—§π—¬ π—œπ— π—£π—₯π—˜π—¦π—¦ π—žπ—”π—₯π—”π—’π—žπ—˜πŸŽ―πŸ”₯✨ - Kirils Solovjovs ( @k )

Think you can bluff your way through a security talk with zero prep? Now is your chance! At Security Impress Karaoke, you'll be handed a totally random, security-themed slide deck you’ve never seen before and have just 3 minutes to present it like a pro. This is all about having fun, thinking fast, and impressing the crowd with your creativity and/or chaos. Come take the podium and let’s see what you’ve got!

Kirils Solovjovs https://www.linkedin.com/in/kirilssolovjovs/ is Latvia’s top white-hat hacker and IT policy activist with 10+ years in offensive security and command-line mastery.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #SecurityKaraoke #CyberHumor #PublicSpeaking #HackerLife

That time when we gather around the table…
…and fix the printer, reset the router, and explain 2FA.
Happy Friends & Family Tech Support Day to all who celebrate!
May your Wi-Fi be strong and your patience stronger.
#CkC #TechSupportDay #infosec #hackerlife #thanksgiving

Okay I know I could simply repair the keyboard with the intermittent keyboard problem impacting a couple of keys by taking apart my HP Dev One and cleaning/fixing/replacing things which will fix the problem, but am I doing that?

Of course not. Instead I'm of course thinking about just upgrading the laptop and I am trying to use this scenario as an excuse to try and justify a new fancy laptop purchase.

#infosec #HackerLife #hacker #firstworldproblems

If you run Sendmail for a domain and are under regular attack by APT actors, then boy oh boy I have a fun blog post for you! What? Just me?

Ah well, you might find it interesting nonetheless as it is a monitoring problem I needed solving, and managed to actually meet my own needs.

https://www.markloveless.net/blog/2025/11/13/apt-and-sendmail-monitoring

#infosec #security #HackerLife #apt

APT and Sendmail Monitoring β€” Mark Loveless

Instead of simply discarding incoming phishing emails from APT actors, I decided to make sure it was loud and clear in mail logs that I discarded them - with attribution.

Mark Loveless

A flaw led to more, then equipment upgrades and then things accelerated. What critical systems were impacted? Well, my own. Yup, massive techno-drama on the #homelab front.

https://www.markloveless.net/blog/2025/10/29/network-updates

#infosec #HackerLife

Network Updates β€” Mark Loveless

Everything on the network is finally done. Oh who am I kidding? Things change constantly between software and hardware updates and upgrades. This just documents a small part of it.

Mark Loveless

It’s not a good rack rewiring day unless you scrape off some skin. But things are _slightly_ more secure.

#homelab #infosec #hacker #HackerLife

I do appreciate the fact that many people are thrilled and excited to talk about the movie Hackers like they are. But when asked about it, they are typically shocked that I hated the film.

Yes it was in part that by comparison to the 1992 film Sneakers (and of course reality itself) it was wildly inaccurate, but as someone who remembers Eternal September* the film Hackers became its own version of that with a massive influx of newbies on security and hacker mailing lists and USENET channels saying "Teach me how to hack" who wanted instant results and would not respond well to pointers to papers and whatnot filled with technical details. "But I want to hack, not do homework!" was a reply I remember seeing that summed up a common feeling amongst newbs. Trying to explain that the film exaggerated and was fiction simply fell on deaf ears for many.

And that is why I hate the movie Hackers. Just remembering the film Sneakers that starred Robert Redford (RIP).

* https://en.wikipedia.org/wiki/Eternal_September

#hacker #HackerLife #infosec #sneakers #robertredford #rip

Eternal September - Wikipedia

Fascinating report. Comment Crew was definitely already on my radar when I worked at MITRE, to the point that they were targeting NMRC as they had made the connection that my day job was MITRE. Not that I am saying that this confirms things disclosed to me in classified MITRE meetings, but this report from @kimzetter confirms a LOT for me. A fun read!

https://www.zetter-zeroday.com/how-the-infamous-apt-1-report-exposing-chinas-pla-hackers-came-to-be/

#infosec #apt #HackerLife #hacker #security #opsec

How the Infamous APT-1 Report Exposing China’s PLA Hackers Came to Be

This is the first in a series of pieces I’ll publish that take an in-depth look at significant events, people and cases in security and surveillance from the past. If there’s something you think would make a good topic for this series, reach out to me at countdowntozeroday@

ZERO DAY