SecureWaffle🧇

@SecureWaffle@twit.social
78 Followers
302 Following
1.2K Posts
Love waffles (obv) but also networking and ways to secure it. Perpetual student in all things.
GitHubhttps://gist.github.com/magicwaffle
Twitterhttps://twitter.com/tiptoepag

Help request. My brother has Stage 4 colorectal cancer.

His life insurance has refused to pay out on a technicality, meaning he and his loved ones cannot afford the mortgage on their home.

I've never asked for anything in return for infosec stuff, but if you have anything spare, please chuck it this direction instead:

https://gofund.me/b9a0d8f4

Microsoft SLT should be ashamed of themselves for this one. Microsoft knowingly platforms hate.
Hey @leo, can you share the link to the online shop for where you get your shirts from that you wear on intelligent machines? I'd love to sport a few myself:)
I thought a guy was trying to draw me into conversation with a cutesy ice breaker to flirt with me — “how far away do you think the sun is?” — but he really did just tell me how many kilometers away the sun is and left. I have been visited by the Autistic Special Interest Fairy

One big thing to be aware of for domestic violence scenarios - I just managed to access the Recall UI (to browse and search snapshots) using my Windows Hello PIN. It doesn't need biometrics, that failed for me as the light isn't on in my room.

That's inconsistent between the Recall setup and documentation, where it tells you biometrics is needed.

Okay, the Recall database is still an SQLite database in AppData. Same path.

Accessible without admin rights and without triggering UAC using TotalRecall.

It's encrypted using a .net now, AesGcm - https://learn.microsoft.com/en-us/dotnet/api/system.security.cryptography.aesgcm

I think I've found the decryption key, one for another day as I've teevee to watch now.

AesGcm Class (System.Security.Cryptography)

Represents an Advanced Encryption Standard (AES) key to be used with the Galois/Counter Mode (GCM) mode of operation.

Working with Chris Krebs and getting to know his wife Emily and their family has been one of the great honors of my life. The extralegal attack against their family should be condemned by all.

I have written a post about what is happening to them here: https://www.linkedin.com/posts/alexstamos_exclusive-former-trump-official-targeted-activity-7318372702438707201-SLo2

Exclusive | Former Trump Official Targeted With Government Probe Vows to… | Alex Stamos

*The following is a message from Alex and Katie Stamos and does not represent any company or organization* Working with Chris Krebs and getting to know his wife Emily and their five children has been one of the great honors of my life. For the entire time I have known Chris, he has demonstrated a deep love for his country, a dedication to protecting American democracy from foreign adversaries, and great skill in shaping the policy and technical environment to America’s advantage. After being unanimously confirmed by the United States Senate as the first Director of the Cybersecurity and Infrastructure Security Agency, Chris took an oath to protect and defend the United States Constitution. He was following this oath when he built the technical infrastructure needed to prevent vulnerabilities in state and local election systems, advocated for paper ballots, and provided unprecedented support for fifty bipartisan Secretaries of State who uniformly praised his leadership during the 2020 election. He was also following this oath when he reported his observations to the American people. The might of the Executive Branch is now aimed at Chris and his family based on personal targeting so corrosive to democratic norms that the Framers explicitly disallowed it in our Constitution. Chris and Emily made the decision years ago to forgo the rewards of the private sector for government service, for them to face an legal attack that was marked out-of-bounds at the founding of our nation should be publicly condemned by any American who believes in the Constitution as the guiding document of our country. Considering how honorably Chris and Emily have acted, it is no surprise that Chris has decided to step down from SentinelOne in an effort to spare his colleagues from collective punishment for actions he took as a Senate-confirmed officer of the President’s last administration. My wife Katie and I stand 100% behind the Krebs family and we pray for them and for the future of our democracy. https://lnkd.in/ghiKCriD

Must-read report from NPR, showing once again that DOGE is a massive threat to the cyber/national security of the United States:

"In the first days of March, a team of advisers from President Trump's new Department of Government Efficiency initiative arrived at the Southeast Washington, D.C., headquarters of the National Labor Relations Board.

The small, independent federal agency investigates and adjudicates complaints about unfair labor practices. It stores reams of potentially sensitive data, from confidential information about employees who want to form unions to proprietary business information.

The DOGE employees, who are effectively led by White House adviser and billionaire tech CEO Elon Musk, appeared to have their sights set on accessing the NLRB's internal systems. They've said their unit's overall mission is to review agency data for compliance with the new administration's policies and to cut costs and maximize efficiency."

"But according to an official whistleblower disclosure shared with Congress and other federal overseers that was obtained by NPR, subsequent interviews with the whistleblower and records of internal communications, technical staff members were alarmed about what DOGE engineers did when they were granted access, particularly when those staffers noticed a spike in data leaving the agency. It's possible that the data included sensitive information on unions, ongoing legal cases and corporate secrets — data that four labor law experts tell NPR should almost never leave the NLRB and that has nothing to do with making the government more efficient or cutting spending."

"Meanwhile, according to the disclosure and records of internal communications, members of the DOGE team asked that their activities not be logged on the system and then appeared to try to cover their tracks behind them, turning off monitoring tools and manually deleting records of their access — evasive behavior that several cybersecurity experts interviewed by NPR compared to what criminal or state-sponsored hackers might do."

"The employees grew concerned that the NLRB's confidential data could be exposed, particularly after they started detecting suspicious log-in attempts from an IP address in Russia, according to the disclosure. Eventually, the disclosure continued, the IT department launched a formal review of what it deemed a serious, ongoing security breach or potentially illegal removal of personally identifiable information. The whistleblower believes that the suspicious activity warrants further investigation by agencies with more resources, like the Cybersecurity and Infrastructure Security Agency or the FBI."

https://www.npr.org/2025/04/15/nx-s1-5355896/doge-nlrb-elon-musk-spacex-security

The Ivantis, Solarwinds and Fortinets right now.

#cve #mitre #infosec

CVE program faces swift end after DHS fails to renew contract, leaving security flaw tracking in limbo - https://www.csoonline.com/article/3963190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html

MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program will end April 16 after DHS did not renew its funding contract for reasons unspecified. Experts say ending the program, which served as the crux for most cybersecurity defense programs, is a tragedy.

#1028

CVE program averts swift end after CISA executes 11-month contract extension

After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would have left security flaw tracking in limbo. CISA stepped in to provide a bridge.

CSO Online