Thund3r-struck@bsky
banner
thund3r-struck.bsky.social
Thund3r-struck@bsky
@thund3r-struck.bsky.social
Former I.T. Consultant with over 20 years experience now focused on cybersecurity🌟Pentester, Offensive Security Engineer. Currently working on my OSCP (Offensive Security Certified Professional)Certification.
Reposted by Thund3r-struck@bsky
Those fucking Republican fools staying silent right now think this fascist shit won’t come for them too.

You dumbfucks.
Open a history book.
It’s not if.
It’s when.
June 12, 2025 at 10:24 PM
Reposted by Thund3r-struck@bsky
Hi. I’m an expert in modernizing legacy government software systems. This is profoundly stupid and will definitely fail, and it’s just a question of whether our social security system fails along with it.
March 28, 2025 at 2:54 PM
Reposted by Thund3r-struck@bsky
DEI never once helped me in my career but I can recall so many times an unqualified white guy got an opportunity he didn’t earn that I’ve lost count.
We have to over prove merit while they get rewarded based on potential & vibes.
This is one reason diverse teams do better overall
January 26, 2025 at 2:56 PM
Reposted by Thund3r-struck@bsky
Let the purges begin.
NEW: The Pentagon's first act after Trump was sworn in today was to remove the official portrait of former Joint Chiefs chairman retired Gen. Mark Milley

www.politico.com/live-updates...
Pentagon removes new portrait of Mark Milley
The picture of the former Joint Chiefs chair lasted less than two weeks.
www.politico.com
January 20, 2025 at 9:15 PM
Reposted by Thund3r-struck@bsky
Beyond disgraceful.

I cannot imagine a more cowardly affront to the rule of law than siding with traitors who favored political violence over free elections and the Constitution.

I’m speechless.
January 21, 2025 at 2:00 AM
Reposted by Thund3r-struck@bsky
I wrote a post about how AI will interface with end-to-end encryption. TL;DR maybe not so well! blog.cryptographyengineering.com/2025/01/17/l...
Let’s talk about AI and end-to-end encryption
Recently, I came across a fantastic new paper by a group of NYU and Cornell researchers entitled “How to think about end-to-end encryption and AI.” I’m extremely grateful to see t…
blog.cryptographyengineering.com
January 17, 2025 at 3:43 PM
Reposted by Thund3r-struck@bsky
The cybersecurity executive order @cyberscoop.bsky.social has been informing you for months about was released this morning www.whitehouse.gov/briefing-roo...
Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity | The White House
By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency
www.whitehouse.gov
January 16, 2025 at 2:18 PM
Reposted by Thund3r-struck@bsky
Billion-dollar video game: is this the most expensive piece of entertainment ever made?
Billion-dollar video game: is this the most expensive piece of entertainment ever made?
How player-funded development launched a multiplayer game of galactic proportions – and costs – in Star Citizen How much does it cost to make a video game? The development expenses of blockbuster games are closely guarded business secrets, but they have…
www.theguardian.com
January 16, 2025 at 11:39 AM
Reposted by Thund3r-struck@bsky
“Experts warn of the risks of sharing your data without careful xonsideration.“RedNote might seem like a quick fix for TikTok fans ahead of its potential ban in the U.S., but it comes with serious cybersecurity and privacy risks”… www.forbes.com/sites/kateof...
Is RedNote Safe? Here’s What Millions Of TikTok Users Need To Know
As TikTok users flock to RedNote, there are several considerations, including the privacy of your data. Here’s what you need to know.
www.forbes.com
January 15, 2025 at 7:25 PM
Reposted by Thund3r-struck@bsky
Reposted by Thund3r-struck@bsky
Check out my latest appearance with the 'PrOTect IT All' podcast. You can tune in here where we discuss how to practically build an OT cybersecurity program, and how to build a career in the field as a cybersecurity practitioner! protectitall.co/episodes/und... #ICScybersecurity
Understanding Cybersecurity Challenges in Industrial Settings with Lesley Carhart
In this episode, host Aaron Crow converses with Lesley Carhart, Technical Director at Dragos, who brings over 15 years of experience in incident response and forensics within critical infrastructure s...
protectitall.co
January 13, 2025 at 7:37 PM
Reposted by Thund3r-struck@bsky
Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions.
Microsoft: macOS bug lets hackers install malicious kernel drivers
Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions.
www.bleepingcomputer.com
January 13, 2025 at 6:24 PM
Reposted by Thund3r-struck@bsky
A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.
Ransomware abuses Amazon AWS feature to encrypt S3 buckets
A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.
www.bleepingcomputer.com
January 13, 2025 at 3:27 PM
Reposted by Thund3r-struck@bsky
A significant rise in credential stealer campaigns has proven highly successful, primarily driven by social engineering, where attackers convince users to execute the malware themselves.
Critical Warning For 100 Million Apple Users—New Hack Attack Confirmed
Security researchers have warned that a new variant of the Banshee credential-stealer is targeting Apple’s 100 million macOS users. Here’s what you need to know.
www.forbes.com
January 12, 2025 at 12:54 PM
Reposted by Thund3r-struck@bsky
Luxembourg government websites knocked offline in latest cyberattack | Luxembourg Times www.luxtimes.lu/luxembourg/l...
Luxembourg government websites knocked offline in latest cyberattack
Several websites were inaccessible for a two-hour period on Friday afternoon
www.luxtimes.lu
January 11, 2025 at 2:02 PM
Reposted by Thund3r-struck@bsky
Banshee stealer evades detection using Apple XProtect encryption algo https://buff.ly/4hbfWKX
Banshee stealer evades detection using Apple XProtect encryption algo
A new version of the Banshee info-stealing malware for macOS has been evading detection over the past two months by adopting string encryption from Apple's XProtect.
buff.ly
January 11, 2025 at 3:12 PM
Reposted by Thund3r-struck@bsky
A network protocol stack is a hierarchy of layered protocols that collaboratively manage communication between devices, handling tasks from application-level interactions to physical data transmission over a network 😎👇

#sysadmin #devops #infosec #cybersecurity
December 4, 2024 at 1:15 PM
Reposted by Thund3r-struck@bsky
Post-apocalypse show pausing for the apocalypse
ign.com IGN @ign.com · Jan 9
Production on some of Hollywood's biggest shows, including the next season of Fallout, have come to a screeching halt after major fires broke out across Los Angeles county. bit.ly/4h48YHt
January 9, 2025 at 10:15 AM
Reposted by Thund3r-struck@bsky
Reposted by Thund3r-struck@bsky
LIVE: WIRED journalists are tuning in and will be bringing you the most important updates from the courtroom and our analysis as the justices consider what could be one of the most consequential First Amendment rulings of the past several decades.
TikTok SCOTUS Live Blog: The Court Hears Arguments Over Potential Ban
We're tuning in live as the justices consider what could be one of the most consequential First Amendment cases of the past several decades.
www.wired.com
January 10, 2025 at 3:07 PM
Reposted by Thund3r-struck@bsky
Security Bite: macOS malware ‘Banshee’ found using Apple’s own code to evade detection
Security Bite: macOS malware ‘Banshee’ found using Apple’s own code to evade detection
9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art…
9to5mac.com
January 10, 2025 at 3:56 PM
Finally closed the X account , glad to see it go
November 15, 2024 at 1:52 AM