If you reward technology teams to ignore cybersecurity, they will.
If you think security teams can magically stop criminals and spies while this is happening, you are fooling yourself.
Things are not always what they seem
Redfin | Rent Head of Information Security
Former Ubisoft Director of Security Operations
Microsoft Alumni | Former Director of MSRC's Cloud Incident Response | He/Him/Hrm | Philosopher & Ninja
SANS:
GCIH #16353 - Cerified Incident Handler
GWAPT #3274- Web Application Pen Tester
GXPN #164 - Exploit Researcher and Advanced Penetration Tester
If you reward technology teams to ignore cybersecurity, they will.
If you think security teams can magically stop criminals and spies while this is happening, you are fooling yourself.
Asciicinema joins the crab army! https://blog.asciinema.org/post/three-point-o/
That one is straight outta the UK LAPSUS playbook btw, eg they frequently get access to Azure and start spinning up VMs and using them to host data from other victims, they daisy chain them together like The Data Centerpede so every victim hosts other stolen data.
ReliaQuest may have been detailing the Prosper incident there, we’ll see.
Jimmy Kimmel show got cancelled by his network for saying:
“The MAGA Gang desperately trying to characterize this kid who murdered Charlie Kirk as anything other than one of them and doing everything they can to score political points from it.. In between the finger-pointing, there was grieving,”
Good thing everybody is so concerned about free speech.
https://www.cnbc.com/2025/09/17/charlie-kirk-jimmy-kimmel-abc-disney.html
RE: https://infosec.exchange/@Enigma/115137776715198675
It sure does look like additional indicators are manifesting
https://socket.dev/blog/ongoing-supply-chain-attack-targets-crowdstrike-npm-packages
That NodeJS supply chain hack incident is amazing because the threat actor(tm) got RCE access to like a billion devices and ran the world’s shittest Etherum dumper.
Imagine if they had done reverse shells instead, or automated lateral movement to ransomware deployment NotPetya style.
The thing that saved companies here was the threat actor was incompetent crypto boy, nothing more.
It would be nice if Github could be talked to about their preference for strong wording, especially since there is a known left goal post associated with the poluted version of debug...
Instead, their post reads:
Patched Versions: None
Affected versions: All?
Remediation steps, blanket rotate all creds in all things with dependencies on debug?
<sigh> come on folks...