Sean Gallagher :verified: 🐀 :donor:
banner
thepacketrat.infosec.exchange.ap.brid.gy
Sean Gallagher :verified: 🐀 :donor:
@thepacketrat.infosec.exchange.ap.brid.gy
Principal Threat Poker @ Sophos X-Ops. Natsec/Infosec Editor Emeritus and now infrequent contributor @ Ars Technica. Ex Navy officer and actual […]

[bridged from https://infosec.exchange/@thepacketrat on the fediverse by https://fed.brid.gy/ ]
July 28, 2025 at 8:21 PM
For millenia these guys have swooped around marshes, creeks and ponds virtually unchanged (other than in size, possibly), the apex predators of airborne invertebrates (and in nymph node, of aquatic ones). Let's not f**k things up for one kind of evolutionary […]

[Original post on infosec.exchange]
June 19, 2025 at 11:31 PM
@cjust @deepthoughts10 @SophosXOps you can take measures to block that s***, and we detect it and can block it, but from a legal sense we can’t call it “malware”.
April 17, 2025 at 1:59 PM
@cjust @deepthoughts10 @SophosXOps when I refer to it as “legitimate” it is purely from a legal standpoint. It was intended for research and security testing purposes only, just like Cobalt Strike. It is open source and has a license.
April 17, 2025 at 1:56 PM
@jerry 100 percent in alignment: my daughter just accepted a full scholarship to law school. Once I'm done paying her rent for three years, my utility is done.
April 16, 2025 at 6:49 PM
SVE joins CyberThreaterator and other projects hosted by my imaginary security startup Falling Anvil Labs. You can also find useful things like very dumb base64 encode and decode tools, and Threaderator (my tool for building social media threads offline, all in one HTML page you can save to your […]
Original post on infosec.exchange
infosec.exchange
April 16, 2025 at 6:40 PM
Some of the initial contributions are bangers.
April 16, 2025 at 6:33 PM
Early submissions (the system is in soft-launch mode) can be seen here: https://falling-anvil.com/sve/submissions.html

It's lightweight. Scalable. And it uses the Cyberthreaterator naming service to generate unique, memorable vulnerability names -- no more crappy marketing vuln names, no sir.
April 16, 2025 at 6:27 PM