| profile pic | an alligator chilling on a sidewalk |
| profile pic | an alligator chilling on a sidewalk |
Now Hiring: 21st century Earth Senior Designers for Starfleet Engineering (Legacy Systems). Successful candidates will be trained in Security (Cryptography Controls) systems at Utopia Planitia Fleet Yards. Benefits include lifetime Federation-standard spatio-temporal post-scarcity counselling services, healthcare, housing and fulfilment of basic needs.
Individuals must consent to irrevocable temporal displacement. #StarTrek #StarfleetCareers #StarfleetRecruitment
Holy cow! Politico EU has this series of nine investigative pieces about a French cybersurveillance firm called Altrnativ by @ElisaBraun and @JulesDrmnn. It's going to take me all day to read them.
Leaked: The Altrnativ world of cybersurveillance
https://www.politico.eu/leaked-altrnativ-world-cybersurveillance/
I go through lots of graph paper, so I made a LaTeX template to print my own. It was so handy that @duetosymmetry and I turned it into a LaTeX package.
There are various grid styles (graph, quadrille, hex, iso, dot grid, etc), and both custom and pre-defined color schemes.
Use it to easily print your own paper, or to make pdf page templates for your favorite tablet note-taking app.
Github: https://github.com/mcnees/LaTeX-Graph-Paper
CTAN: https://ctan.org/pkg/gridpapers?lang=en
Make your own quadrille, graph, hex, etc paper! Uses the pgf/TikZ package for LaTeX, which should be part of any modern TeX installation. - mcnees/LaTeX-Graph-Paper
While my following/reach is relatively small on here compared to Twitter, I want to start this discussion regardless.
Red Team vs.(?) Blue Team
Frequent releases of offensive tooling, specifically C2 frameworks are awfully detrimental to blue teams. As someone that works on network detections, observing newly published frameworks regularly is disheartening and frustrating. It's no secret that open source offensive tooling is adopted by APTs and cybercrime groups and that leaves me with one question, why do it?
From my perspective, I can see some value in open sourcing such tooling for the purpose of assisting other red teams with engagements but surely the fact that malicious actors adopt the same tooling heavily outweighs the pros here?
For the red teamers following me (if any), what is your opinion on this issue? Why does it feel like 'vs.' is legitimate here but for the wrong reasons? These practices are also (in my opinion) contradictory to what purple teams stand for and shouldn't be considered purple teaming by any stretch of the any imagination.
I'd like to keep snarky/passive aggressive remarks (I've been guilty in the past) to non-existent here please. If you want to call me an idiot, my DMs are open.
Good read from Google's Threat Analysis Group:
"Prigozhin interests and Russian information operations"
https://blog.google/threat-analysis-group/prigozhin-interests-and-russian-information-operations/