grecs
banner
grecs.infosec.exchange.ap.brid.gy
grecs
@grecs.infosec.exchange.ap.brid.gy
Defending networks & #training #cybersecurity by day; researching #infosec by night; use to run #shmoocon #firetalks each winter; always looking to make the […]

🌉 bridged from https://infosec.exchange/@grecs on the fediverse by https://fed.brid.gy/
Reposted by grecs
Really enjoyed David Gerard's amusing take on how programming with AI becomes like a gambling addiction for many.

"Large language models work the same way as a carnival psychic. Chatbots look smart by the Barnum Effect — which is where you read what’s actually a generic statement about people […]
Original post on infosec.exchange
infosec.exchange
June 6, 2025 at 2:22 PM
Reposted by grecs
Well someone took that a little literally...
April 19, 2025 at 8:19 PM
Reposted by grecs
That moment
April 18, 2025 at 7:26 AM
Reposted by grecs
I've been hacking at stuff for years. And by hacking, I mean literally, approaching real-time problems ("gotta figure this out NOW”) with a deep bag of tricks developed over, wow, decades of experience with UNIX systems.

The bag of tricks includes a bunch of command line tools like cut, sort […]
Original post on infosec.exchange
infosec.exchange
April 11, 2025 at 5:53 PM
Reposted by grecs
If you want to submit vulnerability reports/findings via Bugcrowd, you're going to need to enable 2FA. Kind of crazy that it wasn't mandatory before, actually.

"We recently accelerated this work on our product roadmap after identifying threat intelligence involving leaked credentials from other […]
Original post on infosec.exchange
infosec.exchange
April 8, 2025 at 11:38 AM
Reposted by grecs
Happy 8th birthday to infosec.exchange 🎂🎈🎈🎉
April 5, 2025 at 11:25 AM
Reposted by grecs
Hello friends. The dreaded and long awaiting blog on WHAT THE FUCK HAPPENED TO THE CYBERSECURITY JOBS MARKET has arrived.

https://tisiphone.net/2025/04/01/lesley-what-happened-to-the-cybersecurity-skills-shortage/

I'm sorry.
tisiphone.net
April 2, 2025 at 3:05 AM
Reposted by grecs
Defensive Security Podcast Episode 299

Summary In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a Disney employee's mishap with an AI tool that led to a significant hack, vulnerabilities in VMware ESX […]
Original post on infosec.exchange
infosec.exchange
March 10, 2025 at 12:53 AM
Reposted by grecs
HEAR ME OUT
Charity infosec D&D steam
But it’s Kevin, Brian, Alyssa, Tarah, Deviant, and Patrick
And they have to rob a museum.
March 9, 2025 at 2:33 AM
Reposted by grecs
Skype, that VOIP service that had potential before it got bought by Microsoft, is now apparently being killed off by Microsoft on May 5 in an effort to get more people to use Teams.

Microsoft Plans to Kill Skype, but Did It Ever Truly Live? […]
Original post on infosec.exchange
infosec.exchange
February 28, 2025 at 5:23 PM
Reposted by grecs
Mom: “No videogames, go play outside”
Me: “Ok”
February 26, 2025 at 4:08 PM
Reposted by grecs
After a week of painstaking (well... KIND of painstaking) research, I have an update to my macOS disk usage woes. https://darthnull.org/spotlight-update/

I'm still confident I've found the problem, but now I have a better appreciation for how drive spotlight indexing can also eat up a lot of […]
Original post on infosec.exchange
infosec.exchange
February 27, 2025 at 9:57 PM
Reposted by grecs
Defensive Security Podcast Episode 297

Become a Patreon supporter of the show here: Links:

https://defensivesecurity.org/defensive-security-podcast-episode-297/
Defensive Security Podcast Episode 297
<!--powerpress_player--><div class="powerpress_player" id="powerpress_player_17"><audio class="wp-audio-shortcode" controls="controls" id="audio-7375-2" preload="none" style="width: 100%;"><source src="https://media.blubrry.com/1463551/content.blubrry.com/1463551/Defensive_Security_Podcast_Episode_297.mp3?_=2" type="audio/mpeg"/><a href="https://media.blubrry.com/1463551/content.blubrry.com/1463551/Defensive_Security_Podcast_Episode_297.mp3">https://media.blubrry.com/1463551/content.blubrry.com/1463551/Defensive_Security_Podcast_Episode_297.mp3</a></audio></div><p class="powerpress_links powerpress_links_mp3" style="margin-bottom: 1px !important;">Podcast: <a class="powerpress_link_pinw" href="https://media.blubrry.com/1463551/content.blubrry.com/1463551/Defensive_Security_Podcast_Episode_297.mp3" onclick="return powerpress_pinw('https://defensivesecurity.org/?powerpress_pinw=7375-podcast');" rel="nofollow" target="_blank" title="Play in new window">Play in new window</a> | <a class="powerpress_link_d" download="Defensive_Security_Podcast_Episode_297.mp3" href="https://media.blubrry.com/1463551/content.blubrry.com/1463551/Defensive_Security_Podcast_Episode_297.mp3" rel="nofollow" title="Download">Download</a> | <a class="powerpress_link_e" href="https://defensivesecurity.org/defensive-security-podcast-episode-297/" onclick="return powerpress_show_embed('7375-podcast');" rel="nofollow" title="Embed">Embed</a></p><p class="powerpress_embed_box" id="powerpress_embed_7375-podcast" style="display: none;"><input id="powerpress_embed_7375-podcast_t" onclick="javascript: this.select();" onfocus="javascript: this.select();" readonly="" style="width: 70%;" type="text" value='&lt;iframe width="320" height="30" src="https://defensivesecurity.org/?powerpress_embed=7375-podcast&amp;amp;powerpress_player=mediaelement-audio" title="Blubrry Podcast Player" frameborder="0" scrolling="no"&gt;&lt;/iframe&gt;'/></p><p class="powerpress_links powerpress_subscribe_links">Subscribe: <a class="powerpress_link_subscribe powerpress_link_subscribe_rss" href="https://defensivesecurity.org/feed/podcast/" rel="nofollow" target="_blank" title="Subscribe via RSS">RSS</a></p> <figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper"> <iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" height="453" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/9DRi_erJ5lQ?feature=oembed" title="Defensive Security Podcast Episode 297" width="604"></iframe> </div></figure> <p> </p> <p>Become a Patreon supporter of the show here: <a href="https://www.patreon.com/defensivesec">https://www.patreon.com/defensivesec</a></p> <p>Links:</p> <ul> <li>https://www.cybersecuritydive.com/news/ransomware-gangs–tactics-/739937/</li> <li>https://www.bleepingcomputer.com/news/security/over-12-000-keriocontrol-firewalls-exposed-to-exploited-rce-flaw/</li> <li>https://arstechnica.com/information-technology/2025/02/russian-spies-use-device-code-phishing-to-hijack-microsoft-accounts/</li> <li>https://www.darkreading.com/cyber-risk/open-source-ai-models-pose-risks-of-malicious-code-vulnerabilities</li> <li>https://www.csoonline.com/article/3823429/24-of-vulnerabilities-are-abused-before-a-patch-is-available.html</li> </ul> <div class="sharedaddy sd-sharing-enabled"><div class="robots-nocontent sd-block sd-social sd-social-icon sd-sharing"><h3 class="sd-title">Share this:</h3><div class="sd-content"><ul><li class="share-twitter"><a class="share-twitter sd-button share-icon no-text" data-shared="sharing-twitter-7375" href="https://defensivesecurity.org/defensive-security-podcast-episode-297/?share=twitter" rel="nofollow noopener noreferrer" target="_blank" title="Click to share on Twitter"><span></span><span class="sharing-screen-reader-text">Click to share on Twitter (Opens in new window)</span></a></li><li class="share-facebook"><a class="share-facebook sd-button share-icon no-text" data-shared="sharing-facebook-7375" href="https://defensivesecurity.org/defensive-security-podcast-episode-297/?share=facebook" rel="nofollow noopener noreferrer" target="_blank" title="Click to share on Facebook"><span></span><span class="sharing-screen-reader-text">Click to share on Facebook (Opens in new window)</span></a></li><li class="share-linkedin"><a class="share-linkedin sd-button share-icon no-text" data-shared="sharing-linkedin-7375" href="https://defensivesecurity.org/defensive-security-podcast-episode-297/?share=linkedin" rel="nofollow noopener noreferrer" target="_blank" title="Click to share on LinkedIn"><span></span><span class="sharing-screen-reader-text">Click to share on LinkedIn (Opens in new window)</span></a></li><li class="share-end"></li></ul></div></div></div> <div class="jp-relatedposts" id="jp-relatedposts"> <h3 class="jp-relatedposts-headline"><em>Related</em></h3> </div>
defensivesecurity.org
February 18, 2025 at 2:25 PM
Reposted by grecs
A Boston local news station recently interviewed a local man who had his Experian account hijacked after he'd frozen his credit with the big three consumer reporting bureaus. It's unbelievable that Experian still hasn't done jack about this problem that I've written about ad nauseum for years […]
Original post on infosec.exchange
infosec.exchange
February 5, 2025 at 6:37 PM
Reposted by grecs
Defensive Security Podcast Episode 295

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the alarming statistics surrounding ransomware attacks, the implications of paying ransoms, and the evolving nature of […]
Original post on infosec.exchange
infosec.exchange
February 3, 2025 at 1:38 AM
Reposted by grecs
The Consumer Financial Protection Bureau (CFPB) published its annual list of consumer reporting companies. This lengthy list identifies dozens of specialty reporting companies that collect and sell access to people’s data, including individuals’ finances, employment, check writing histories, or […]
Original post on infosec.exchange
infosec.exchange
January 31, 2025 at 3:43 AM
Reposted by grecs
Ground stop in effect at Reagan National Airport after small aircraft crashes into the Potomac River.https://wtop.com/arlington/2025/01/small-aircraft-crashes-into-potomac-river-near-reagan-national-airport/
January 30, 2025 at 2:54 AM
<sigh> Lots of Xitter spam notifications today (even though I have all the “related” and “recommended” options disabled). So nice to be here instead!
January 25, 2025 at 10:30 PM
Reposted by grecs
Some fascinating research out on hacking a Subaru via STARLINK connected vehicle service.

"On November 20, 2024, Shubham Shah and I discovered a security vulnerability in Subaru’s STARLINK connected vehicle service that gave us unrestricted targeted access to all vehicles and customer accounts […]
Original post on infosec.exchange
infosec.exchange
January 23, 2025 at 1:56 PM
In hindsight should have totally created a Pixelfed instance called tictic, toktic, or something. Just might have accidentally gotten and number of TicTok refugees. https://www.bleepingcomputer.com/news/software/tiktok-shuts-down-in-the-us-as-trump-throws-the-company-a-lifeline/
TikTok shuts down in the US as Trump throws the company a lifeline
TikTok shut down in the U.S. late Saturday night following the Supreme Court's decision to uphold the law that banned the company over national security concerns.
www.bleepingcomputer.com
January 19, 2025 at 6:23 PM
Been pretty hectic since last weekend … the whole last #shmoocon thing is sinking in. :(
January 18, 2025 at 11:24 PM