20 Followers
9 Following
38 Posts
Technical Infrastructure Engineer/Embarrassing Dad/Annoying Husband. Love #LFC #FOOTBALL #MOVIES & #TECH
Housing Horrors on Instagram: "What does this home owner do for a living? #home #property #sunderland"

8,324 likes, 306 comments - housinghorrors_ on January 24, 2026: "What does this home owner do for a living? #home #property #sunderland".

Instagram

Whistleblower reveals evidence on how Elon Musk's DOGE team extracted 10 GB of sensitive data about American citizens from a government agency, and then deleted accounts and logs to cover their tracks.

Then, when the whistleblower tried to report the data breach, he received a threatening letter containing pictures taken from a drone watching him walking his dog.

https://www.npr.org/2025/04/15/nx-s1-5355896/doge-nlrb-elon-musk-spacex-security

I didn't realize how fucking useful the word 'fucking' is for eliminating AI

Turns out, it's really fucking useful!

Doge.gov has been defaced as they have no security whatsoever

https://www.404media.co/anyone-can-push-updates-to-the-doge-gov-website-2/

Anyone Can Push Updates to the DOGE.gov Website

"THESE 'EXPERTS' LEFT THEIR DATABASE OPEN."

404 Media

Drop what you are doing and read this incredible story from Wired, if you can. After that, come back here.

https://www.wired.com/story/edward-coristine-tesla-sexy-path-networks-doge/

It mentions that a 19 y/o man who's assisting Musk's team and who has access to sensitive government systems is Edward Coristine. Wired said Coristine, who apparently goes by the nickname "Big Balls," runs a number of companies, including one called Tesla.Sexy LLC

"Tesla.Sexy controls dozens of web domains, including at least two Russian-registered domains. One of those domains, which is still active, offers a service called Helfie, which is an AI bot for Discord servers targeting the Russian market.While the operation of a Russian website would not violate US sanctions preventing Americans doing business with Russian companies, it could potentially be a factor in a security clearance review."

The really interesting part for me is Coristine's work history at a company called Path Networks, which Wired describes generously as a company "known for hiring reformed black-hat hackers."

"At Path Network, Coristine worked as a systems engineer from April to June of 2022, according to his now-deleted LinkedIn resume. Path has at times listed as employees Eric Taylor, also known as Cosmo the God, a well-known former cybercriminal and member of the hacker group UGNazis, as well as Matthew Flannery, an Australian convicted hacker whom police allege was a member of the hacker group LulzSec. It’s unclear whether Coristine worked at Path concurrently with those hackers, and WIRED found no evidence that either Coristine or other Path employees engaged in illegal activity while at the company."

The founder of Path is a young man named Marshal Webb. I wrote about Webb back in 2016, in a story about a DDoS defense company he co-founded called BackConnect LLC. Working with Doug Madory, we determined that BackConnect had a long history of hijacking Internet address space that it didn't own.

https://krebsonsecurity.com/2016/09/ddos-mitigation-firm-has-history-of-hijacks/

Incidentally, less than 24 hours after that story ran, my site KrebsOnSecurity.com was hit with the biggest DDoS attack the Internet had ever seen at the time. That sustained attack kept my site offline for nearly 4 days.

https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/

Here's the real story behind why Coristine only worked at Path for a few months. He was fired after Webb accused him of making it known that one of Path's employees was Curtis Gervais, a serial swatter from Canada who was convicted of perpetrating dozens of swattings and bomb threats -- including at least two attempts on our home in 2014. [BTW the aforementioned Eric Taylor was convicted of a separate (successful) swatting against our home in 2013.

https://krebsonsecurity.com/2017/09/canadian-man-gets-9-months-detention-for-serial-swattings-bomb-threats/

https://krebsonsecurity.com/2017/02/men-who-sent-swat-team-heroin-to-my-home-sentenced/

In the screenshot here, we can see Webb replying to a message from Gervais stating that "Edward has been terminated for leaking internal information to the competitors."

Wired cited experts saying it's unlikely Coristine could have passed a security clearance needed to view the sensitive government information he now has access to.

Want to learn more about Path? Check out the website https://pathtruths.com/

DOGE Teen Owns ā€˜Tesla.Sexy LLC’ and Worked at Startup That Has Hired Convicted Hackers

Experts question whether Edward Coristine, a DOGE staffer who has gone by ā€œBig Ballsā€ online, would pass the background check typically required for access to sensitive US government systems.

WIRED

To help defenders find their impacted orgs in the Fortigate configuration dump incident, here's all emails mentioned - Ctrl+F for yourself.

Obvious point - not everybody puts their email address in a config file.

https://raw.githubusercontent.com/GossiTheDog/Monitoring/refs/heads/main/Fortigate-Config-Dump-emails.txt

Anybody else seeing Microsoft Azure Active Directory Connect account bruteforce?

AADSignInEventsBeta
| where Application == ā€œMicrosoft Azure Active Directory Connectā€

In particular error code 50126 and 50053

If you like large post incident reviews of major ransomware incidents - there’s only a few of these - the British Library one is out now:

https://www.bl.uk/home/british-library-cyber-incident-review-8-march-2024.pdf

The long story short is they lacked resiliency, detection capability, and somebody exposed RDP to the internet for remote access for contractors.

Multi agency advisory on #CitrixBleed. Patch.

Lots of new IOCs in this. Boeing provided a detailed play by play of their LockBit incident. https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a

New, by me: Ukraine has fired two of its most senior cybersecurity officials amid a corruption probe.

Yurii Shchyhol, head of Ukraine’s Ukraine’s State Special Communications Service of Ukraine, or SSSCIP, and his deputy Victor Zhora (pictured), who served as deputy chairman and chief digital transformation officer at SSSCIP, were both dismissed by the government.

When reached for comment, Zhora told TechCrunch: ā€œI will defend my name and reputation in a court.ā€

https://techcrunch.com/2023/11/20/ukraine-fires-senior-cybersecurity-officials-ssscip/

Ukraine fires top cybersecurity officials | TechCrunch

Viktor Zhora, one of the most senior Ukrainian cybersecurity officials, told TechCrunch: "I will defend my name and reputation in a court."

TechCrunch