me: well uh apparently our finance minister/deputy PM resigned which seems to have sent our country into political turmoil?
me: but besides that, things are ok I guess!
| https://www.twitter.com/worldwise001 |
https://chaos.social/@gsuberland/113286048932464881
I was on a security TAC where a known cyber threat intel firm had a rep talking through some of the threat actor groups they had seen, and I was silently cackling as it was slowly dawning on everyone in the room that like it was basically “kids being kids” but on the internet, which meant figuring out possible incentives/motivations and trying to predict what would happen next was hard; and ofc figuring out the right mitigations to set up was even harder.
sometimes people just do dumb shit with no deep motivation
seeing a lot of "the internet archive got hacked/ddos'ed because of [insert complex political/financial reason here]" posts but all evidence so far points to it just being some edgelord kids doing it for clout.
the lawsuits are a different matter entirely, of course.
After almost 5 years at 1Password, it’s time for a new challenge. If you know of any interesting remote roles that need extensive leadership experience and application security expertise, feel free to reach out!
Resume: https://adamcaudill.com/resume/

About Me I am passionate about my work – it’s not simply a job. I want to work where my skills are challenged, and I can learn new things. I don’t believe in giving up or settling for “good enough” – I demand better than that of myself. I consider myself extremely lucky to be paid to write and break code; it’s both a hobby and profession for me. Technology Security: I have a knack for breaking things; I leverage my knowledge of developers to choose approaches that others miss.
nmap ${target} -p 631 --script cups-info
is your IR command of the day
1Password Extended Access Management (XAM) secures all applications, on any device, and across any network, whether IT-managed or not. Empower your teams with the tools they need while maintaining the visibility and access controls necessary to secure your organization.