47 Followers
71 Following
160 Posts

"The Party told you to reject the evidence of your eyes and ears. It was their final, most essential command." — George Orwell, 1984

https://joshbuker.com/blog/ice-shooting-of-renee-nicole-good/

#ICE #ReneeNicoleGood #Shooting

ICE Shooting of Renee Nicole Good

Fact checking claims surrounding the shooting of Renee Nicole Good on January 7th, 2026.

Josh Buker

What happens when a company or organization collects your personal data, but eventually goes out of business? Most organizations don't have a plan in place for decommissioning data, and your personal information might end up sold or leaked to third parties.

The Data Privacy Engineering working group within Cloud Security Alliance is tackling this problem head on, and could use your help developing best practices. Our research is volunteer driven, and released for free to help better the entire industry.

Join us as we tackle Privacy Lifecycle Management, specifically with decommissioning of data in mind. We meet every other Wednesday at Noon Pacific Time. To receive a calendar invite, sign up at: https://csaurl.org/dpe-signup

#Privacy #DataPrivacy #DataPrivacyEngineering #Cloud #CloudSecurity #CloudSecurityAlliance #cybersecurity #InfoSec

Data Privacy Engineering - Cloud Security Alliance

Being in cybersecurity and being a robotics mentor means occasionally being confused by FIRST (Forum of Incident Response and Security Teams) and FIRST (For Inspiration and Recognition of Science and Technology)
Take It Down would give the rich & powerful an easy way to demand content removal—no questions asked. https://www.eff.org/deeplinks/2025/03/trump-calls-congress-pass-overbroad-take-it-down-act-so-he-can-use-it-censor
Trump Calls On Congress To Pass The “Take It Down” Act—So He Can Censor His Critics

We've opposed the Take It Down Act because it could be easily manipulated to take down lawful content that powerful people simply don't like. Last night, President Trump demonstrated he has a similar view on the bill. He wants to sign the bill into law, then use it to remove content about — him....

Electronic Frontier Foundation

That feeling when your president starts regurgitating Russian propaganda...

We're so cooked. 🙃

Google is attempting to kill uBlock Origin and other adblockers by removing support within Chrome and disabling the extension for "not following best practices".

A rather disappointing, if unsurprising, move by Google. Turns out when your company makes tons of money off of ads, and controls one of the most used browsers in the world, you can get up to quite the antitrust shenanigans.

#google #chrome

Drop what you are doing and read this incredible story from Wired, if you can. After that, come back here.

https://www.wired.com/story/edward-coristine-tesla-sexy-path-networks-doge/

It mentions that a 19 y/o man who's assisting Musk's team and who has access to sensitive government systems is Edward Coristine. Wired said Coristine, who apparently goes by the nickname "Big Balls," runs a number of companies, including one called Tesla.Sexy LLC

"Tesla.Sexy controls dozens of web domains, including at least two Russian-registered domains. One of those domains, which is still active, offers a service called Helfie, which is an AI bot for Discord servers targeting the Russian market.While the operation of a Russian website would not violate US sanctions preventing Americans doing business with Russian companies, it could potentially be a factor in a security clearance review."

The really interesting part for me is Coristine's work history at a company called Path Networks, which Wired describes generously as a company "known for hiring reformed black-hat hackers."

"At Path Network, Coristine worked as a systems engineer from April to June of 2022, according to his now-deleted LinkedIn resume. Path has at times listed as employees Eric Taylor, also known as Cosmo the God, a well-known former cybercriminal and member of the hacker group UGNazis, as well as Matthew Flannery, an Australian convicted hacker whom police allege was a member of the hacker group LulzSec. It’s unclear whether Coristine worked at Path concurrently with those hackers, and WIRED found no evidence that either Coristine or other Path employees engaged in illegal activity while at the company."

The founder of Path is a young man named Marshal Webb. I wrote about Webb back in 2016, in a story about a DDoS defense company he co-founded called BackConnect LLC. Working with Doug Madory, we determined that BackConnect had a long history of hijacking Internet address space that it didn't own.

https://krebsonsecurity.com/2016/09/ddos-mitigation-firm-has-history-of-hijacks/

Incidentally, less than 24 hours after that story ran, my site KrebsOnSecurity.com was hit with the biggest DDoS attack the Internet had ever seen at the time. That sustained attack kept my site offline for nearly 4 days.

https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/

Here's the real story behind why Coristine only worked at Path for a few months. He was fired after Webb accused him of making it known that one of Path's employees was Curtis Gervais, a serial swatter from Canada who was convicted of perpetrating dozens of swattings and bomb threats -- including at least two attempts on our home in 2014. [BTW the aforementioned Eric Taylor was convicted of a separate (successful) swatting against our home in 2013.

https://krebsonsecurity.com/2017/09/canadian-man-gets-9-months-detention-for-serial-swattings-bomb-threats/

https://krebsonsecurity.com/2017/02/men-who-sent-swat-team-heroin-to-my-home-sentenced/

In the screenshot here, we can see Webb replying to a message from Gervais stating that "Edward has been terminated for leaking internal information to the competitors."

Wired cited experts saying it's unlikely Coristine could have passed a security clearance needed to view the sensitive government information he now has access to.

Want to learn more about Path? Check out the website https://pathtruths.com/

DOGE Teen Owns ‘Tesla.Sexy LLC’ and Worked at Startup That Has Hired Convicted Hackers

Experts question whether Edward Coristine, a DOGE staffer who has gone by “Big Balls” online, would pass the background check typically required for access to sensitive US government systems.

WIRED

@andrewnez Just found your ecosyste.ms project after @joshbressers was kind enough to point it out to me.

Super awesome project! Would you mind if we use the API for a FOSS dependency timeline audit tool we're building at CSA? Your project has exactly the kind of data that would make for great signals of things like if a project is maintained.

Source code: https://github.com/CloudSecurityAlliance/Dependency-Timeline-Audit

GitHub - CloudSecurityAlliance/Dependency-Timeline-Audit: Dependency Timeline Audit

Dependency Timeline Audit. Contribute to CloudSecurityAlliance/Dependency-Timeline-Audit development by creating an account on GitHub.

GitHub

If you care about Data Privacy, and want to help build practical guidance and best practices on related topics such as DataSecOps and Differential Privacy, the non-profit I work for is forming a working group on Data Privacy Engineering (DPE) and is looking for volunteers!

The kickoff call is this Wednesday, July 10th, at Noon Pacific Time.

You can register for the kickoff call at: https://csaurl.org/dpe-kickoff-call-registration

The @cloudsecurityalliance puts out all of its research for free at https://csaurl.org/downloads

Learn more at: https://cloudsecurityalliance.org/research/working-groups/data-privacy-engineering

If you have any questions, let me know!

#dataprivacy #datasecops #differentialprivacy #cloudsecurity #privacy

Welcome! You are invited to join a meeting: Data Privacy Engineering (DPE) Kickoff Call. After registering, you will receive a confirmation email about joining the meeting.

Working Group Community: https://circle.cloudsecurityalliance.org/community-home1?CommunityKey=c179c605-2e27-415a-842c-018fc63d4965

Zoom

Surprised I haven't heard more people talking about CVE-2024-30078. WiFi RCE is kinda a big deal.

#cve, #CVE_2024_30078