13 Followers
91 Following
68 Posts
GitLab's High-Severity Bug: A Party No One Wants An Invite To

GitLab urges users to update their software to patch a high-severity vulnerability that could lead to major security breaches. Don't miss out on this crucial cybersecurity news.

The Nimble Nerd

Prepare to have your circuits rewired and your data banks updated.

We are proud to announce our keynote speaker is @eljefedsecurit !

Check out our list of speakers and schedule.
https://bsidesorlando.org/schedule/

Don't forget to get your tickets.
https://bsorl.org/reg-23

#bsidesorlando #informationsecurity #CyberSecurity

Saturday Conference Schedule - BSides Orlando September 27, 2025

Security BSides Orlando Septemeber 27, 2025

Security BSides Orlando
We’re all just looking for the new best BBS after the one idiot who just kept posting SPAM endlessly showed up.
I want to delete my twit* account, but then how will I ever find out about “automatic” iPhone updates????

"Identity is the new Perimeter "

I should have raged against this nonsense when it started to become a buzz phrase

Web-based Session management is the emperor's new clothes and identity based controls are left naked as a result.

Does anyone else feel like they are slipping into a coma when they use or try to learn Linux?
14 years later and the only industry that Bitcoin has revolutionized is the ransomware industry.

A vendor gets breached and their source code is published. Finish the story for me ...

Absolutely the Bad Guys™ are going to be looking for zero-days. That's what happened when ransomware group RansomEXX posted the source code of American Megatrends International's (AMI) MegaRAC baseboard management controller (BMC) software.

Eclypsium has found a trove of vulnerabilities in the BMC software used in servers and other gear from AMD, Asus, ARM, Dell EMC, Gigabyte, Lenovo, Nvidia, Qualcomm, Hewlett-Packard Enterprise, Huawei, Ampere Computing, ASRock, and more. Altogether, Eclypsium has uncovered a number of vulnerabilities by analyzing the source code, and these are tracked with the moniker BMC&C.

The latest disclosed vulnerabilities bypass authentication and allow for remote code execution with the highest privileges.

It's absolutely critical that security organizations have controls in place for inventorying and monitoring low-level components in their IT infrastructure. It's a massive attack surface that people need to pay more attention to.

#BMC #firmware #supplychainsecurity

Read more in the excellent write-up from @dangoodin

https://arstechnica.com/security/2023/07/millions-of-servers-inside-data-centers-imperiled-by-flaws-in-ami-bmc-firmware/

Firmware vulnerabilities in millions of computers could give hackers superuser status

BMCs give near-total control over entire fleets of servers. What happens when they're hacked?

Ars Technica

@SwiftOnSecurity on a slightly different track - I left systems admin after about 25 years, went back to end user support, and I've never been happier at work.

The idea that helpdesk and support roles are "bottom rung" is pervasive and I bought into that for ages and made myself miserable.

Still, the skills I've picked up working in that back end stuff is incredibly useful in solving problems and knowing when and where to escalate, for sure.

My bar for friendships from this point forward will be "Jamie Lee Curtis As Michelle Yeoh Wins a Golden Globe" -level ride or die.

#GoldenGlobes #JamieLeeCurtis #MichelleYeoh #Friendship #Women