52 Followers
59 Following
342 Posts
IT generalist (IT infrastructure manager, system & security engineer) for everything; #sysadmin #infosec #cybersec #infrastructure - Vienna, Austria
Contact & Informationhttps://nohub.lol
Hecate - Cyber Defensehttps://hecate.pw
Pflanzn - Plant Care Cockpithttps://pflanzn.app
Githubhttps://github.com/0x3e4

I've been feeling very bad about cybersecurity as a career for a while now, and it's due to GenAI. It feels utterly hopeless fighting against the hype and fear. It fucking sucks, as it's not possible to defend people in this environment.

It's pissing into the wind, and the wind is people panicking about stuff they do not understand and have no real world context about.

In unrelated news, this is a good post about Mythos:

https://www.linkedin.com/posts/grossmanjeremiah_the-dominant-view-in-my-filter-bubble-is-ugcPost-7455423063791394816-kMz1?utm_source=social_share_send&utm_medium=member_desktop_web&rcm=ACoAACWLjocBFQ8Y5Jn8ptUamSXWFWCD5cA1Rto

The dominant view in my filter bubble is that Mythos and other AI models will make exploit development, especially zero-days, dramatically easier, and that a vulnpocolypse is ahead of us. Easy enough… | Jeremiah Grossman | 20 comments

The dominant view in my filter bubble is that Mythos and other AI models will make exploit development, especially zero-days, dramatically easier, and that a vulnpocolypse is ahead of us. Easy enough that we should soon see an explosion in Known Exploited Vulnerabilities (KEVs). I’m watching the indicators closely, but in my view the hysteria is driving people towards protecting against what the adversary just doesn’t do, and just doesn’t care about. Cybersecurity will pay a price for bad advice. The fact is long before AI was generating code or finding bugs, we had years of rapidly accelerating CVE discovery and expanding exploit code availability. If vulnerability volume and exploit availability drove outcomes, KEVs would have scaled with it. The numbers don’t show that. For those unfamiliar with exploit development, most CVEs never get “weaponized” for in-the-wild campaigns, and for reasons beyond technical difficulty. Reachability: A large portion of vulnerable code isn’t externally exposed. It sits behind authentication, behind perimeter firewalls, or behind services that never face the Internet. If an adversary can’t reach it, it doesn’t matter that it exists. Reliability: A proof of concept proves something once. Real targets aren’t the lab. Versions differ, configurations drift, dependencies behave unpredictably. What works in one environment fails in another. Turning a bug into an exploit that works consistently across many targets is real work. That’s what adversaries need. Pervasiveness: Enough targets have to stay vulnerable long enough to matter. Many don’t. Vulnerabilities that are reachable, reliable, and pervasive often get patched, blocked, or otherwise neutralized before anyone builds a campaign around them. More capability doesn’t change what attackers need. It just makes it easier to produce things they still won’t use. The common mistake is to treat “might work,” or “works in the lab” as “will be used.” That leap is where a lot of the current confusion in cybersecurity starts. Want my advice. Protect your VPNs. Use MFA. | 20 comments on LinkedIn

LinkedIn

So CopyFail CVE-2026-31431 is a thing.

If you're on the Ubuntu platform, 26.04 is not affected. 18.04 through 25.10 are indeed affected, but no fixes are available.

If you're on another platform, check with your vendor for update availability.

Augarten, Vienna
#austria
Hecate Cyber Defense

OpenSourceMalware.com - Community Threat Intelligence

Security professionals sharing intelligence on malicious packages, repositories, and CDNs to protect the open source ecosystem.

sureal numbers for OpenClaw.. ready for prod rollout.
sneak peak.. Hecate MCP
(sorry not sorry for german prompt)

Let's address the elephant in the room, shall we?

Not a single bug was found by Mythos in Internet Explorer 11. Not a single one.

To hell with Open Source, let's go proprietary closed source again and build a moat around our much valued IT assets and lock it all up.

Who's laughing now, Anthropic?

New addition.. AppLocker Policy Viewer!

https://nohub.lol/applocker

Pure client-side parser and viewer.

Another interesting handy feature - Chain Cert Checker: https://nohub.lol/chain
nohub.lol - 0x3e4

nohub.lol - A collection of security advisories