Peter Skaronis 

13 Followers
38 Following
40 Posts

I haven't been here for a while?

What's new peeps?

OSINT: The Mastodon Paedophile Problem

Mastodon has a major paedophile problem, join computer scientist Edward Charles for a closer look at the pedophilic side of the fediverse.

Secjuice
@omi_geek ghost in the shell.

@anton_chuvakin @pbrass as I posted on Twitter apple’s latest update to reset airdrop to contacts only after 10 minutes is an inherently secure design choice. The system resets itself to a known secure baseline regardless of the user’s intervention.
It’s like nightly reimagining of VMs.
ChromeOS is another example. It’s a hardened Linux OS with all the dangerous toys hidden away. Most users will stick to the browser and use anything within sight. Combination of hardened OS and security by obscurity.
Finally, apple’s product design choices, soldered everything, no removable parts or drives, limited ports, is not serviceable and annoying but it increases the inherent security due to lack of exploitable means.
Controlling both software and hardware gas the potential to increase inherent security if done right.
The alternative, for example Android devices produced by 3rd party vendors loaded with 5 different questionable app stores and some with malware as part of the image is the definition of inherent insecurity. A bag of trouble.

Phew, Twitter wouldn’t let me write all this thing without going into a 15 threat answer.

@JasonFossen surprised the left out @briankrebs and @jackrhysider
@geeksteev brilliant.
@accidentalciso they shouldn’t be any difference. The difference is usually in support hours and SLAs. They prioritisation should only happen with subsidised companies like other companies selling wireless plans under XYZ brand. That is definitely lower priority. Emergency services have the highest and the carrier.
@GossiTheDog dogmeat for ransonware. Perfect.

A new exploit chain is being used by Play ransomware affiliates to bypass ProxyNotShell mitigations and gain remote code execution on unpatched Microsoft Exchange servers through Outlook Web Access (OWA).

CrowdStrike incident responders discovered the exploit (dubbed OWASSRF) while investigating recent Play ransomware attacks where compromised Exchange servers were used to infiltrate the victims' networks.

https://www.bleepingcomputer.com/news/security/ransomware-gang-uses-new-microsoft-exchange-exploit-to-breach-servers/

Ransomware gang uses new Microsoft Exchange exploit to breach servers

Play ransomware threat actors are using a new exploit chain that bypasses ProxyNotShell URL rewrite mitigations to gain remote code execution (RCE) on vulnerable servers through Outlook Web Access (OWA).

BleepingComputer
@abrignoni for fun.