49 Followers
129 Following
132 Posts

Believe me when I say the "Electrician to Info Sec" pipeline is real.

OIF & OEF

Soon to be a SOC Team Member.

Interested in Industrial Control Systems, Physical Security, Forensics, Fuzzing (IDK why but I find it funny), Python, and the list goes on and on.

I think having new hobbies is my hobby.

Websitehttps://blog.joseph-dains.com/
Anyone have any recommendations for a managed EDR solution?

Ding, dong: It's the ~ this week in security ~ gong:

• LockBit worked with Russia-linked Evil Corp
• Meta's smart glasses hacked to insta-dox
• China hacked US internet providers' wiretap systems
• How a 'serial hacker' tried to fake his own death (and failed)
• US seizes Russia's ColdRiver phishing domains
• Plus: Mysterious zero-day hits Rackspace
• And lots more.

Sign up/RSS: https://this.weekinsecurity.com/

Read online: https://mailchi.mp/weekinsecurity/this-week-in-security-october-6-2024-edition

Support/donate: https://ko-fi.com/thisweekinsecurity

~this week in security~

a free cybersecurity newsletter by @zackwhittaker, delivered weekly.

Had a fun time at the Recorded Future #IntelligenceRoadShow today. It was a really nice setting and it was nice meeting people. Kind of my first step into these types of events. I am looking forward to doing more.

https://mailchi.mp/malwaretech.com/malwaretechs-weekly-cybersecurity-update?e=323a552880

Good lord. What an excellent newsletter.

Very insightful summary on why the US could be so hot to strike Kaspersky down.

Ignore the 500 warning. It takes you straight to @malwaretech’s new blog.

500: We've Run Into An Issue | Mailchimp

#hack100days : day 16d : Looked at establishing #persistence w/via registry run and runonce and via Startup. Only the beginning, really. #blueteamers are you watching these keys and folders?:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
C:\Users\<USERNAME>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup (I was able to write here and use it in stock lab machine.)
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup (Requires elevated privileges to save here.)

#redteam #windows #infosec

Speaker McCarthy proclaimed on Friday that "this chamber is now fully open for all Americans." Apparently not.

https://twitter.com/cspan/status/1612570750522740757

CSPAN on Twitter

“NOTE: C-SPAN cameras are no longer in the House chamber. We have resumed using the feed from House/government-operated cameras.”

Twitter

Let’s see how Mastodon does with one of these:

Reply to this toot with what you do, and I’ll tell you why you’re probably going to get fired.

Synology fixes maximum severity vulnerability in VPN routers

Taiwan-based NAS maker Synology has addressed a maximum (10/10) severity vulnerability affecting routers configured to run as VPN servers.

BleepingComputer
Jr. Security Engineer

We’re looking for a passionate Junior Security Engineer to join our growing team and help us deliver intuitive and delightful experiences to our customers. We are considering remote applications globally.   Job Description The Junior Security Engineer is an opportunity that introduces aspiring cybersecurity professionals to the day-to-day operations of security within the company. Junior Engineers are primarily exposed to frontline duties associated with cybersecurity practices and are introduced to the processes of event assessment and escalation (when warranted) to senior members of the cybersecurity team. This entry-level position is a fantastic opportunity to learn firsthand how cybersecurity controls are implemented, managed, and enhanced across the business.  Working alongside one or more mentors, Junior Security Engineers perform data collection, ticket processing, analysis and remediation tasks. Junior Engineers also work with cybersecurity team members to understand architectural designs, best practices, and event and incident response (IR) obligations. Junior Engineers provide support to the security operations center (SOC), IR and security networking teams. To be effective, Junior Engineers must have a general understanding of cybersecurity principles and concepts, as well as solid practical hands-on experience with computers.     What you’ll contribute in this role…  Respond to security questionnaires and RFPs from potential customers and interested parties. Follow and execute directives issued by cybersecurity management and senior employees. Support day-to-day activities performed by the cybersecurity team. Learn to manage tools and solutions implemented throughout the organization. Work with senior members of the team to learn basic first-line threat assessment and response tasks and progress toward independence after proving competence.  Execute tasks requested by cybersecurity team members, such as analysis, investigation, reporting and maintenance of general cybersecurity upkeep.  Assist in supporting SOC, IR and security networking teams.  Monitor dashboards and event logs with escalation to members of the cybersecurity team.  Attain proven proficiency with cybersecurity tools and perform front-end troubleshooting and general triage. Read daily cybersecurity resources to stay current on security threats and vulnerabilities.  Actively participate with the team in mock threat exercises to strengthen skills. Perform other duties as assigned.  Progress towards a Security Engineer position.   What experience you’ll bring to Spiff…   Undergraduate hands-on and general knowledge coursework in cybersecurity or information technology  –and/or– Demonstrated hands-on lab experience collecting, investigating and documenting threats and incidents  –and/or— Ability to speak to cybersecurity projects completed during education and training. Fundamental knowledge of cybersecurity principles and best practices. General knowledge and hands-on coursework (lab) experience with cybersecurity endpoint, network, vulnerability, forensic and log management tools. Basic understanding, knowledge of and hands-on capabilities with operating system configuration (Windows, Unix, Linux) and networking (DNS, DHCP, routing protocols). Ability to analyze event and incident logs, and work with SOC and IR teams to assess security events related to malware, vulnerabilities, exploits and kill chain methodology. Introductory knowledge of cloud-based infrastructure and operations. Basic exposure to one or more scripting languages (e.g., Python, PowerShell, and/or Bash) preferred. Basic knowledge of adversary tactics.   Bonus Points  Proven trustworthiness and history of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively. Solid written and verbal communication skills. Capable of working with diverse teams. Organized and punctual. Confident, but humble and willing to learn and take initiative. Recommendations from previous instructors, employers, or internship sponsors or Certificates obtained during coursework are a plus, but not required   Compensation… At Spiff Inc. we are committed to equal pay and opportunities. In order to provide full transparency, the salary range for this position is USD $50k - $70k per annum for all candidates based in the US.This position is eligible for equity. If you are located outside of the US and would like to have visibility on the salary range valid in your location, it can be disclosed by your recruiter upon request. Spiff Inc. will consider internal equity, external market information and each candidate's prior experience, education, location, skills and aptitudes for the role they are applying for.   What types of perks and benefits we offer…  What types of perks and benefits we offer… Competitive Salary and Equity Remote First & Friendly Company 100% Premium Coverage for High-Deductible Medical, Dental, & Vision Insurance Up to $1200 a year towards your Health Savings Account Additional Comprehensive FSA, Life, AD&D, Critical Illness, Group Accident, Hospital Indemnity, Legal, Commuter Coverages available for you & your dependents Company-sponsored Short-Term & Long-Term Disability Insurance Company-sponsored Mental Health Insurance & access to online counseling Flexible Time Off Flexible work hours Parental leave 401(k)

Minorities in Cybersecurity

I'm sure someone has already posted about this and I just missed it, but Rackspace Blames Zero-Day Exploit for Ransomware Hit Success.
They are also sort of blaming Microsoft a little bit.

Hosting Giant Says Microsoft's Patch Notes Didn't Detail Remote-Code Execution Risk

Remember how it broke that malicious actors had found ways to skirt around the ProxyNotShell URL filtering mitigatsion provided by Microsoft? Do you also remember how anybody in the #InfoSec community knew it was only a matter of time before this happened because there are always ways to get around filters like this?
Ah, anyway, Rackspace was relying on the URL filtering and hadn't actually patched.

Rackspace says it didn't immediately apply the Exchange patch released last November by Microsoft because of multiple user reports that the patch was causing errors, including leaving Microsoft Outlook Web Access - OWA - inaccessible. Pending a fully working patch, the company says it instead used mitigations recommended by Microsoft.

#ProxyNotShell #RackSpace #M365 #O365 #Exchange #MSExchange

Rackspace Blames Zero-Day Exploit for Ransomware Hit Success

Rackspace says the ransomware-wielding attackers who disrupted its hosted Microsoft Exchange Server environment last month wielded a zero-day exploit, described by