mindhackdiva  〠

29 Followers
26 Following
50 Posts
Vulnerability Management Analyst/EtHacker/Threat Hunter with an insane passion for all things cybersecurity, INFOSEC, Enterprise Defense, The Wu Tang Clan, and Super Mario Bros. 17 years as ISSO for the DoD. ✨Follow for more awesomeness!✨ #infosecgirls
HackHerWay Cybersecurityhttps://hackherway.blogger.com
My GitHubhttps://GitHub.com/d0midigi
X-Twitterhttps://twitter.com/@d0midigi
Cyberhomehttps://mindhackdiva.tech
How do you pronounce MySQL?
1️⃣ My S-Q-L (ess-queue-el?)
2️⃣ My Sequel
3️⃣ My-STFU
4️⃣ I don't care
AOL (Sign On - Dial Up)

YouTube
Cybercriminals are so appreciative of unpatched systems that they’ve started sending 'thank you' cards. Because why waste time looking for vulnerabilities when some companies are practically gift-wrapping them?   

Someone just pinged me about my thoughts for 2023, and what to expect.
My answer was simple.
Same as 2022, just more painful.
☑️Here's the logic.

UNTIL y'all can actually EFFECT change on something as simple as the OWASP Top 10 then nothing's going to change.
For the last 5-6 years that basic TEN things has hardly changed.

For 20 years we've had SQL injection FFS...
So, you want predictions for '23.

More of the same until people take a step BACK, fix the basics, take care of the simple stuff, roll up the sleeves, take care of assets, patching, educating humans, and BASIC backups, etc.
Oh, and sorry, simple shit doesn't get you on the front cover of CISO magazine, or headlining conferences...
STOP chasing the easy button it does NOT exist‼️
‼️STOP with the blinky baubles and crap
‼️STOP with the vendor lunches
‼️STOP being blinded by bullshit
‼️STOP with the "it's not my area"

PICK up a bloody pencil, go count your assets and start there.
Oh, and GO TALK TO the developers, network teams, IT folks, and stop sitting in your ivory towers and quit pretending to be a “progressive, proactive cybersecurity specialist” when you ain’t about shit putting forth your 💯 into the game and actually doing it right.

It's NOT hard, y'all just don't want to do it.
That is all for now. 👩🏻‍⚖️

2023: Predictions.
Someone just pinged me about my thoughts for 2023, and what to expect.
My answer was simple.
Same as 2022, just more painful.
☑️Here's the logic.

UNTIL y'all can actually EFFECT change on something as simple as the OWASP Top 10 then nothing's going to change.
For the last 5-6 years that basic TEN things has hardly changed.

For 20 years we've had SQL injection FFS...
So, you want predictions for '23.

More of the same until people take a step BACK, fix the basics, take care of the simple stuff, roll up the sleeves, take care of assets, patching, educating humans, and BASIC backups, etc.
Oh, and sorry, simple shit doesn't get you on the front cover of CISO magazine, or headlining conferences...
STOP chasing the easy button it does NOT exist‼️
‼️STOP with the blinky baubles and crap
‼️STOP with the vendor lunches
‼️STOP being blinded by bullshit
‼️STOP with the "it's not my area"

PICK up a bloody pencil, go count your assets and start there.
Oh, and GO TALK TO the developers, network teams, IT folks, and stop sitting in your ivory towers and quit pretending to be a “progressive, proactive cybersecurity specialist” when you ain’t about shit putting forth your 💯 into the game and actually doing it right.

It's NOT hard, y'all just don't want to do it.
That is all for now. 👩🏻‍⚖️

I published “OSINT and Top 15 Open Source Intelligence Tools,” 🕵🏻🔍https://medium.com/@mindhackdiva/osint-and-top-15-open-source-intelligence-tools-3b9bd15f19d4
🔹OSINT and Top 15 Open-Source Intelligence Tools🔹

This blog sheds some light on the term OSINT, its types, actors interested in OSINT gathering, exploration, and what benefits OSINT provides security researchers, analysts, and professionals today…

Medium
Hey guys! Here is the first CVE published under my name: CVE-2022-3496 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3496
CVE - CVE-2022-3496

The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.