9 Followers
117 Following
86 Posts
Just coming here for infosec ideas. Sponging from the best
Spam from ISC2. I cannot stress this enough:
Fuck those miserable, predatory parasites, fuck, fuck, fuck them.
@amiserabilist @JonBaker Wayfair is quick with their Spring collection
@platypus my bank used to allow custom security questions, so I set one to "what are you wearing?" and the answer to "that's very inappropriate please transfer me to your manager". the first time an customer service rep encountered it they couldn't stop laughing and had to actually transfer to a coworker to complete the call.

Signal has been running on Signal video for a long time, and the addition of call links about a month ago was a MASSIVE quality of life improvement.

Seriously, give them a try! Imagine, not sharing the contents of your daily standup with a large video conferencing company!

You can bypass path-based WAF restrictions by appending raw/unencoded non-printable and extended-ASCII characters like \x09 (Spring), \xA0 (Express), and \x1C-1F (Flask):

Europe followed the US into Afghanistan. Then US voters elected Trump and he pulled the plug.

Europe let the US lead the defence of Ukraine. And now US voters have voted for Trump, who wants Putin to win.

Europe has centered it's security politics around a US led NATO, and American voters have now voted for Trump, who wants to pull out of NATO.

It is time for a stronger, more capable, and fully independent Europe.

For our generation, this is our Churchill moment — it is time to lead.

This image is absolutely terrifying. Be safe y'all. GTFO if you are in the path.

Someone wrote a cool blog post using RMML for building detections

https://frank-korving.com/posts/kql_and_rmms/

#cybersecurity #infosec

Detecting RMMs using KQL · Frank Korving

Introduction This is a short write-up on using Kusto Query Language (KQL) to detect Remote Monitoring and Management (RMM) artefacts in your process- and network telemetry. It uses multiple open-source projects that aggregate and centrally collect information on available RMMs. Threat actors often make use of legitimate and well-known RMM solutions during real world intrusions. These remote access tools are typically used as initial access vectors after a successful social engineering campaign and then used as a beachhead into the compromised network to pivot, deploy new tooling or exfiltrate data.

The European mind cannot comprehend this:

“The University of California just announced a list of military weaponry it wants in order to escalate its warfare on its students:
3000 rounds of pepper munitions
500 rounds of 40mm impact munitions
12 drones
9 grenade launchers

Read the full list here: https://regents.universityofcalifornia.edu/regmeet/sept24/c1.pdf

Them: “You’re not trans, why are you always defending them?”

Me: “I am also not a domestic cat, and if I see you abusing one of those I’ll kick your ass too.”