Czech penetration tester and infosec writer on medium.
Medium: https://medium.com/@xnomas
Twitter: https://twitter.com/xn0mas
Czech penetration tester and infosec writer on medium.
Medium: https://medium.com/@xnomas
Twitter: https://twitter.com/xn0mas
#Plastic bottle caps! That's right. I've noticed so many people be incredibly annoyed with the change to bottle caps. And I think it's related to #infosec in a way.
If people are very easily frustrated by a slight change that is barely less comfortable, in bottle caps remaining attached after unscrewing, how can we hope for them to reliably implement slightly uncomfortable #security practices?
Thoughts?
Share some cool #infosec stories! Have you worked in a #SOC or done #IncidentResponse ? Tell others in the fediverse of some dope hacker stories you have!
And if there's a lot to share we can have a chat for my blog.
What do #KungFu and #propaganda have in common? They share the same #dojo
At least according to 4n6strider, a #ThreatIntel researcher for Trend Micro. He claims that #China offers free or very cheap Chinese lessons in Kung-Fu schools. The lessons are however full of propaganda and the brainwash of China. All organized from there!
We discussed this in an #interview on my blog.
https://medium.com/@xnomas/4n6strider-interview-with-a-threat-hunter-e06bc409d8b
#apts #threats #chinesespy #research #datascience #nationalsecurity
Here comes another #interview with a #ThreatIntel researcher for #TrendMicro, 4n6strider! This is a long one, so get ready.
https://medium.com/@xnomas/4n6strider-interview-with-a-threat-hunter-e06bc409d8b
We talked about #APT how they operate, how 4n6strider catches them with #honeypots. We discuss his journey to working in #infosec, how #China performs #CognitiveWarfare and #InfluenceOperations. Sprinkle in some #hacked insta accounts and how he got them back. So much to talk about!
Please #share the #blog if you liked it. Really helps to reach an audience.
Oh, and here's an excerpt:
"This was about two months of work, which helped me map-out a Turkish gang that hacked the accounts of about 35 thousand ladies."
Another #interview dropped! With @maxpl0it, a Senior Vulnerability Researcher at Interrupt Labs.
"So my first actual CVE was probably in 2017/2018...It was a format string bug in a restricted CLI of a router."
https://medium.com/@xnomas/maxpl0it-interview-with-a-security-researcher-fe75969010e7
We talk about #VulnerabilityResearch, max's journey and some good advice on #MentalHealth.
Liked the #article? Share it, it helps a lot!
Thanks to everyone that shared my post today.
The #interview I posted today is well on track to beat my previous reads record, and I'm so pumped!!
Thank you all!
Sin talking about getting into cyber crime investigation with an #intelligence background:
"When I made that transition there was certainly a learning curve. Intelligence and investigations can have a sort of symbiotic relationship, and there are certainly aspects that overlap."
To find out how it went go on over and read the article!
If you enjoy it I have a few more for you to read and another coming soon ;]