FauxSSH - ssh login attempts on the honeypot
| homepage | https://royans.net/ |
| https://www.linkedin.com/in/royans/ |
| homepage | https://royans.net/ |
| https://www.linkedin.com/in/royans/ |
FauxSSH - ssh login attempts on the honeypot
Made significant progress in improving the signals to find most relevant Cyber security news and highlight them on #flagthis . With a little help from #GoogleGemini, I implemented a new clustering algorithm to find patterns faster.
I've seen a lot of takes about the latest move to Bluesky. I wanted to try and collect my thoughts about this in one place. I think Bluesky is fascinating, but I also worry about many parts of it. If it becomes the new "Twitter", I think I'm OK with that, but I'll be very quick to cut the cord if it ever starts sucking.
November has sucked so far. One upside of the terrible nonsense is that more people are fleeing X. Many are choosing Bluesky. I’ve seen a bunch of takes about this recently, but I keep seeing things I disagree with. I figure that’s a good enough excuse to write more about this weird-assed social network.
Now you can sort the Security News stories based on recency instead of popularity. Click on Top/Latest at the bottom of the page to change the order.
https://cloud.google.com/blog/topics/threat-intelligence/time-to-exploit-trends-2023/
Fascinating post from Mandiant about its vulnerabilities it analysed in 2023. Here is the kicker: 41 vulnerabilities it analyzed were exploited after the patches came out. And time-to-exploit which used to take months in the last decade has dropped down to an average of 5 days.
What this means: Its not sufficient for service providers to rollout patches in a timely manner. Its also important for them to make it easy to get it deployed quickly so that the exposure reduces significantly.