Gonçalo Ribeiro

@goncalor@infosec.exchange
342 Followers
446 Following
3.4K Posts
Defend. Pwn. Infosec. Free software. Vim nerd. #rustlang #electronics
websitehttps://goncalor.com
GitHubhttps://github.com/goncalor
trying nobara on my old origin PC laptop. It's not really that old, but Microsoft thinks it a quad core system with over 1TB of SSD, and 32GB of ram can't run win11 because it lacks a TPM, so now it gets to become my Linux playground before I commit to LInux on my primary desktop. I really hope this goes well.

> AI assistance was used to help structure and format this vulnerability report.

That was a really stupid idea.

Faking a JPEG | Lobsters

This is so dumb i'm sorry
--
#comics #kevincomics #hbo #hbomax

I received an email earlier this week from EA asking if I wanted to be added to a public acknowledgement page they were creating for individuals who responsibly disclosed vulnerabilities to them.

For all the shit people give EA, of the 100+ companies I contacted in the last two years, they were the only company I would say had a decent incident response.

They fixed the issue within 12 hours after validating it as critical, and proactively provided me multiple updates over time.

When the IR was done on their side, they reached out again with some more information about the potential impact if the issue hadn't been solved quickly, and also offered me a reward.

I did not have to keep chasing anyone for updates, I wasn't asked for non-disclosure, or offered money in exchange for it, and people replied instead of ignoring me.

I wasn't blamed for their mistake, either, or reported to the authorities.

Unfortunately, at least one or multiple of the things mentioned above are present in most of my other incidents reported; it's a real shit show out there.

#cybersecurity #infosec #responsibledisclosure #vulnerability #ea #electronicarts

A programming fact that still amazes me is that the HTTP header which containers the referring url is called "referer", because the developer spelt "referrer" wrong and the spell checker didn't catch it, so it made it into the official standards and they just never changed it lmao
×

I received an email earlier this week from EA asking if I wanted to be added to a public acknowledgement page they were creating for individuals who responsibly disclosed vulnerabilities to them.

For all the shit people give EA, of the 100+ companies I contacted in the last two years, they were the only company I would say had a decent incident response.

They fixed the issue within 12 hours after validating it as critical, and proactively provided me multiple updates over time.

When the IR was done on their side, they reached out again with some more information about the potential impact if the issue hadn't been solved quickly, and also offered me a reward.

I did not have to keep chasing anyone for updates, I wasn't asked for non-disclosure, or offered money in exchange for it, and people replied instead of ignoring me.

I wasn't blamed for their mistake, either, or reported to the authorities.

Unfortunately, at least one or multiple of the things mentioned above are present in most of my other incidents reported; it's a real shit show out there.

#cybersecurity #infosec #responsibledisclosure #vulnerability #ea #electronicarts

@JayeLTee I've almost stopped reporting vulnerabilities because of the issues you mentioned, got the same experiences. Good to know that EA is mature on their communication with security researchers!
@lp1 @JayeLTee With the European Curbesecurity Resilience Act (CRA) taking effect since the beginning of the year, big corps should better set up a proper cybersecurity incident response process quickly, or it will bite them. The CRA requires prompt response and public communication when they're given a security vulnerability report.

@JayeLTee You definitely deserve a lot of credit and public recognition for your volunteer efforts to find leaks and get them locked down.

It's just a shame that it's such a rarity that it happens.

@JayeLTee A lot of the EA team followed Matt and Mike from Microsoft, but more, they’re setting the tone well.
@JayeLTee But also: let them know that it makes you happy to work with them. I’m sure emails like that help keep the program operating well. (You probably have, but if not..)

@adamshostack

Oh, I did, yeah. Their response was so different from everything else I dealt with that I had to give them some positive feedback about it.

Even official bug bounty programs for billion-dollar companies, I have to deal with one message in two months, and it's the company asking me how to connect to their server 

@JayeLTee Btw if you have a way to tie this to defcon I’m looking for stories that I can add to the franlklin report. But for that it needs a defcon tie
@JayeLTee As much as I dislike EA since decades, this is the way to handle it.