Helga Secures All the Things

@bluetea@ioc.exchange
57 Followers
143 Following
972 Posts
Blue team wannabe. Student of information security. Interested in forensics and incident response, as well as human factors and GRC. Free, Libre, and Open Source software and open educational resource enthusiast. #FLOSS #FOSS #OER #blueteam #cybersecurity
Profile picture is a painting of a woman, lost attribution. Profile banner is a whole bunch of gorgeous cable management.

Dijkstra. Now there's a name I recognize, thanks to the hours spent getting my head around solving shortest path algorithms.

https://appdot.net/@mdhughes/114702552000027971

Digital Mark ฮป โ˜•๏ธ ๐Ÿ”ช ๐Ÿ™„ (@mdhughes@appdot.net)

Attached: 1 image Structured Programming by O.-J. Dahl, E. W. Dijkstra, C. A. R. Hoare https://archive.org/details/Structured_Programming__Dahl_Dijkstra_Hoare/page/n1/mode/2up #programming I've read EWD's Discipline of Programming, which I assume contains a lot of this but refined? I don't always agree with EWD but he was worth "arguing" with.

AppDot.Net

Chaos & Cyber Culture by Timothy Leary
With guest appearances by:
๐Ÿ‘‰ William Gibson
๐Ÿ‘‰ Winona Ryder
๐Ÿ‘‰ William S. Burroughs
๐Ÿ‘‰ David Byrne

https://archive.org/details/ChaosAndCyberCulture/mode/2up

Ah, the four horsemen of the cyber apocalypse! โ€ฆ not.

I'm guessing from the pop star list, and a quick flip-thru, it's pretty commercial trash, reheated '60s shit. I never saw it in 1994, and I was the most technical boy in town, as the has-been said.

#cyber #cyberpunk #drugs

Very concerned by the surge in supply-chain attacksโ€”incidents have nearly doubled recently, yet companies remain silent on how theyโ€™re tackling this. Even worse, most users have no idea these attacks are happening. Transparency and awareness are urgently needed to address this growing threat.

:quotesL:Malicious Backdoors Found in Python and npm Packages Targeting Windows and Linux:quotesR: via Oppapick

https://oppapick.com/backdoors-python-npm-windows-linux/

#Tech #TechNews #Linux #Windows #Python #npmpackages #InfoSec

Malicious Backdoors Found in Python and npm Packages Targeting Windows and Linux - Oppapick

In a new wave of supply chain attacks, security researchers have uncovered multiple backdoored open-source packages uploaded to PyPI (Python Package Index) and npm (Node Package Manager). These packages are designed to target both Windows and Linux environments and have been carefully crafted to blend in with legitimate development tools. The discovery comes just as

Oppapick - Lifestyle, Tech, Gardening, everything else

Example of curb cut effect: I created a vocabulary (spelling, pronunciation, & definition) for network engineering terms at my employer, so that CART captioners could prepare.

I now send this to people on other teams or new network engineers as well, because we use a ton of acronyms in neteng.

It's a cheat sheet for all the jargon we use, helpful to a lot more than captioners!

Again, accessibility helps everyone, not just the intended user.

Your team should have a CART glossary. 1/2

Microsoft researchers say an overdependency on AI tools like Copilot negatively impacts people's critical thinking capabilities.

https://www.windowscentral.com/software-apps/copilot-and-chatgpt-makes-you-dumb-new-microsoft-study

Will an overreliance on Copilot and ChatGPT make you dumb? A new Microsoft study says AI 'atrophies' critical thinking: "I already feel like I have lost some brain cells."

Microsoft researchers say an overdependency on AI tools like Copilot negatively impacts people's critical thinking capabilities.

Windows Central
Iโ€™m refusing to on board to Copilot at work. Iโ€™m the only person. When asked why I sent them the MIT and Microsoft research papers as openers.

John Hultquist, Chief Analyst of Google Threat Intelligence Group, is warning that threat actors consistent with Scattered Spider are now targeting the insurance industry.

Scattered Spider activity tends to blanket an entire industry with as many compromises as possible before moving on.

Also, insurance company compromises tend to be waterfall events; the actors often pivot to customers due to all the risk-related data taken.

#threatintel #cybersecurity #infosec

https://www.linkedin.com/posts/john-hultquist-76226478_actors-that-bear-the-hallmarks-of-scattered-activity-7340442348008472577-tOiH?utm_source=share&utm_medium=member_desktop&rcm=ACoAABIZhqYBjXCQuV7JX7N_3xlpxZY6alHZ77o

Nearly time for semester 2 so I have to decide whether I'm going to persist with this certificate study or not. I'm a bit over higher education in general, tbh - got enough degrees. Particularly frustrating when I put in so many hours crafting top notch assignments and people are passing in LLM-generated twaddle and getting away with it. I feel like my time would really be better spent focusing on home lab and TryHackMe, plus writing my blog so I have some decent samples out there for potential employers. Might be time to pull the pin.
And you can always justify
The missile trails across the sky again
The pentagon pizza index is going nuts again tonight. (This is one of the two domino's close to pentagon city).