32 Followers
31 Following
132 Posts
SOAR, ARM stuff? Threat Analyst, OSINT, Malspam interested in Social Engineering. [email protected], http://medium.com/@tanukisec
Bloghttps://medium.com/@tanukisec
Twitterhttps://twitter.com/TanukiSec
If you're using GCP and have enabled Gemini on any of your projects, this one is worth reading, as you may have some checking to do. https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules
Google API Keys Weren't Secrets. But then Gemini Changed the Rules. ◆ Truffle Security Co.

Google spent over a decade telling developers that Google API keys (like those used in Maps, Firebase, etc.) are not secrets. But that's no longer true.

The 2026 Sophos Active Adversary Report is out — and despite the hype, we saw no AI-driven sea change in the threat landscape, based on the 600+ IR and MDR cases that made up our dataset. Attackers mostly stuck with what already works.

Abuse of legitimate tools remained consistent, as did the lack of blocking categories of tools that are known to be routinely abused.

Missing telemetry continued to make it difficult for blue teamers to spot the signal in the noise, and an ongoing lack of phishing-resistant multifactor authentication (MFA) gave the criminals a quiet way in.

The most concerning change has been years in the making: The dominance of identity-related root causes — brute-force attacks, phishing, and other compromised-credential tactics — for successful initial access.

This constellation of tactics leverages weaknesses that can’t be addressed by simple patch hygiene and occasionally acts as a bonus multiplier for attacks in progress.

Key takeaways:

1️⃣ GenAI adds speed, volume, and noise to the threat landscape… but for now, that’s about it.

2️⃣ Identity-related tactics such as compromised credentials, brute-force attacks, and phishing, are by far the most common reason attackers gain initial access.

3️⃣ Attackers have made few changes to specific tools, tactics, or procedures — though one weird blocking trick may make a huge difference for many enterprises.

4️⃣ Saving money by minimizing telemetry collection might be penny-wise, but it’s definitely pound-foolish.

5️⃣ Prevention still beats detection, both in outcomes and in time and effort spent defending.

Read the report here: https://www.sophos.com/en-us/blog/2026-sophos-active-adversary-report

Nowhere, man: The 2026 Active Adversary Report

AI headline hype didn’t deliver a sea change for practical defense — but one below-the-radar development should.

@GossiTheDog Got to add in those vulnerabilities now so they can inflate their AI vulnerability identifcation figures later!
El Paso airport closed after military used new anti-drone laser to zap party balloon

I want to be very, very clear that this should’ve never happened."

Ars Technica
Greebo

Greebo is a cat in Terry Pratchett's Discworld books. He is first introduced in Wyrd Sisters. He is a foul-tempered one-eyed grey tomcat whose human, Nanny Ogg, insists against all the evidence that he is a sweet, harmless kitten. In the course of the books, he has killed two vampires, eating at least one of them in the novel Witches Abroad: The bat squirmed under his claw. It seemed to Greebo's small cat brain that it was trying to change its shape, and he wasn't having any of that from a...

Discworld Wiki

@GossiTheDog Tesco in Liverpool keeps putting up AI Temu slop outside the store.

Remembrance Sunday celebration marked by a solider wearing a dǒulì whilst being attacked by spaceships in a field of melted poppies has been my favourite so far :D

@GossiTheDog Tried it for a day with 6 scus - cost nearly £400, allowed for roughly 5 queries an hour and hallucinated on 3/5 queries Fucking shit show
@GossiTheDog Oh and in additon best hope you only want to isolate win 10 & 11 - windows server can't be isolated

@GossiTheDog Pray to god that you've set up your delegations right in the first place and that your API hook can actually use the isolate command.

To find the delegation rights you have to wade through some bullshit then set it via the API.

Awful interaction all round

@arstechnica Presumably a bot account used to provide fake reviews or similar.