GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Patrick C Miller :donor: (patrickcmiller@infosec.exchange)

  1. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 13:42:16 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Running DOOM On An Atari ST https://hackaday.com/2025/05/22/running-doom-on-an-atari-st/

    In conversation about 24 minutes ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: hackaday.com
      Running DOOM on an Atari ST
      from Heidi Ulrich
      If you grew up with a beige Atari ST on your desk and a faint feeling of being left out once Doom dropped in 1993, brace yourself — the ST strikes back. Thanks to [indyjonas]’s incredible hac…
  2. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 13:12:18 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Premium WordPress 'Motors' theme vulnerable to admin takeover attacks https://www.bleepingcomputer.com/news/security/premium-wordpress-motors-theme-vulnerable-to-admin-takeover-attacks/

    In conversation about 54 minutes ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
      Premium WordPress 'Motors' theme vulnerable to admin takeover attacks
      from @BleepinComputer
      A critical privilege escalation vulnerability has been discovered in the premium WordPress theme Motors, which allows unauthenticated attackers to hijack administrator accounts and take complete control of websites.
  3. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 12:42:13 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Signal Blocks Windows Recall - Schneier on Security https://www.schneier.com/blog/archives/2025/05/signal-blocks-windows-recall.html

    In conversation about an hour ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Signal Blocks Windows Recall - Schneier on Security
      from Bruce Schneier
      This article gives a good rundown of the security risks of Windows Recall, and the repurposed copyright protection took that Signal used to block the AI feature from scraping Signal data.
  4. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 12:12:17 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Pandas Galore: Chinese Hackers Boost Attacks in Latin America https://www.darkreading.com/cyber-risk/pandas-galore-chinese-hackers-attacks-latin-america

    In conversation about 2 hours ago from infosec.exchange permalink

    Attachments


  5. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 11:42:11 JST Patrick C Miller :donor: Patrick C Miller :donor:

    AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation https://thehackernews.com/2025/05/aws-default-iam-roles-found-to-enable.html

    In conversation about 2 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: blogger.googleusercontent.com
      AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation
      from https://www.facebook.com/thehackernews
      AWS default IAM roles with AmazonS3FullAccess exposed accounts to privilege escalation and lateral movement.
  6. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 11:12:16 JST Patrick C Miller :donor: Patrick C Miller :donor:

    GitLab, Atlassian Patch High-Severity Vulnerabilities https://www.securityweek.com/gitlab-atlassian-patch-high-severity-vulnerabilities/

    In conversation about 3 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.securityweek.com
      GitLab, Atlassian Patch High-Severity Vulnerabilities
      from @https://twitter.com/IonutArghire
      GitLab and Atlassian have released patches for over a dozen vulnerabilities in their products, including high-severity bugs.
  7. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 10:42:43 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials https://www.wired.com/story/mysterious-database-logins-governments-social-media/

    In conversation about 3 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: media.wired.com
      Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
      from Matt Burgess,Lily Hay Newman
      A massive trove of 184 million breached records, which have now been taken down, includes user logins for platforms including Apple, Google, and Meta. Among the exposed accounts are ones linked to dozens of governments.
  8. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 10:12:10 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Russian GRU Cyber Actors Targeting Western Logistics Entities and Tech Companies https://www.cisa.gov/news-events/alerts/2025/05/21/russian-gru-cyber-actors-targeting-western-logistics-entities-and-tech-companies

    In conversation about 4 hours ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Russian GRU Cyber Actors Targeting Western Logistics Entities and Tech Companies | CISA
      This advisory details a Russian state-sponsored cyber espionage-oriented campaign targeting technology companies and logistics entities.
  9. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 09:42:20 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Samlify bug lets attackers bypass single sign-on https://www.csoonline.com/article/3993262/samlify-bug-lets-attackers-bypass-single-sign-on.html

    In conversation about 4 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.csoonline.com
      Samlify bug lets attackers bypass single sign-on
      The critical flaw can let an attacker authenticate as an admin with maximum system privileges.
  10. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 09:12:13 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Rethinking Data Privacy in the Age of Generative AI https://www.darkreading.com/cyber-risk/rethinking-data-privacy-age-generative-ai

    In conversation about 5 hours ago from infosec.exchange permalink

    Attachments


  11. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 08:42:14 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics https://thehackernews.com/2025/05/russian-hackers-exploit-email-and-vpn.html

    In conversation about 5 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: blogger.googleusercontent.com
      Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics
      from https://www.facebook.com/thehackernews
      APT28 targets NATO-aligned logistics and tech firms via malware, phishing, and 7 CVEs to spy on Ukraine aid routes.
  12. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 08:12:13 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Sensitive Personal Data Stolen in West Lothian Ransomware Attack https://www.infosecurity-magazine.com/news/personal-data-stolen-west-lothian/

    In conversation about 6 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: assets.infosecurity-magazine.com
      Sensitive Personal Data Stolen in West Lothian Ransomware Attack
      from https://www.infosecurity-magazine.com/profile/james-coker/
      West Lothian Council confirmed that ransomware attackers have stolen personal and sensitive information held on its education network
  13. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 07:42:14 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Kettering Health hit by system-wide outage after ransomware attack https://www.bleepingcomputer.com/news/security/kettering-health-hit-by-system-wide-outage-after-ransomware-attack/

    In conversation about 6 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
      Kettering Health hit by system-wide outage after ransomware attack
      from @BleepinComputer
      Kettering Health, a healthcare network that operates 14 medical centers in Ohio, was forced to cancel inpatient and outpatient procedures following a cyberattack that caused a system-wide technology outage.
  14. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 07:12:12 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Russian GRU’s Unit 26165 conducts two-year cyber espionage on logistics, tech firms using IP cameras, supply chains https://industrialcyber.co/cisa/russian-grus-unit-26165-conducts-two-year-cyber-espionage-on-logistics-tech-firms-using-ip-cameras-supply-chains/

    In conversation about 7 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: industrialcyber.co
      Russian GRU’s Unit 26165 conducts two-year cyber espionage on logistics, tech firms using IP cameras, supply chains - Industrial Cyber
      from Anna Ribeiro
      Russian GRU’s Unit 26165 conducts two-year cyber espionage on logistics, tech firms using IP cameras and supply chains.
  15. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 06:42:15 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Cybercrime is 'orders of magnitude' larger than state-backed ops, says ex-White House advisor https://go.theregister.com/feed/www.theregister.com/2025/05/24/cyber_crime_bigger_than_nation_state/

    In conversation about 7 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: regmedia.co.uk
      Cybercrime much bigger than nation-state ops: Daniel
      INTERVIEW: Michael Daniel also thinks Uncle Sam should increase help to orgs hit by ransomware
  16. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 06:12:18 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Nerf Blaster Becomes Remote Control Turret https://hackaday.com/2025/05/24/nerf-blaster-becomes-remote-control-turret/

    In conversation about 8 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: hackaday.com
      Nerf Blaster Becomes Remote Control Turret
      from Lewin Day
      For most of us, turrets that aim and shoot at things are the sole domain of video games. However, they’re remarkably easy to build with modern technology, as [meub] demonstrates. Meet the Swa…
  17. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 05:42:10 JST Patrick C Miller :donor: Patrick C Miller :donor:

    The Newark airport crisis is about to become everyone’s problem https://www.theverge.com/planes/673462/newark-airport-delay-air-traffic-control-tracon-radar

    In conversation about 8 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: platform.theverge.com
      The Newark airport crisis is about to become everyone’s problem
      from Darryl Campbell
      A shortage of air traffic controllers, bungled IT management, outdated technology, and a brewing disaster in our airspace.
  18. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 05:12:10 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Researchers claim ChatGPT o3 bypassed shutdown in controlled test https://www.bleepingcomputer.com/news/artificial-intelligence/researchers-claim-chatgpt-o3-bypassed-shutdown-in-controlled-test/

    In conversation about 9 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
      Researchers claim ChatGPT o3 bypassed shutdown in controlled test
      from @BleepinComputer
      A new report claims that OpenAI's o3 model altered a shutdown script to avoid being turned off, even when explicitly instructed to allow shutdown
  19. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 04:42:13 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled http://warontherocks.com/2025/05/autonomous-weapon-systems-no-human-in-the-loop-required-and-other-myths-dispelled/

    In conversation about 9 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: warontherocks.com
      Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled - War on the Rocks
      References by Pentagon officials, the think tank world, and various world leaders to autonomous weapon systems often cite a U.S. military policy
  20. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-May-2025 04:12:14 JST Patrick C Miller :donor: Patrick C Miller :donor:

    The Crowded Battle: Key Insights from the 2025 State of Pentesting Report https://thehackernews.com/2025/05/the-crowded-battle-key-insights-from.html

    In conversation about 10 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: blogger.googleusercontent.com
      The Crowded Battle: Key Insights from the 2025 State of Pentesting Report
      from https://www.facebook.com/thehackernews
      Discover findings from Pentera's 2025 State of Pentesting Report, including breach rates, alert fatigue, budget trends & the rise of software testing.
  • Before

User actions

    Patrick C Miller :donor:

    Patrick C Miller :donor:

    Critical Infrastructure & Industrial Security Advisor. Recovering regulator. Airport dweller. #PDX-based. @ampyxcyber President and CEO. CCI US Coordinator. @beerisac coin 001. #ICS #OT #NERCCIP #NIST #TSASD #DHSCPG #IEC62443

    Tags
    • (None)

    Following 1

    • GNU Too

    Followers 1

    • GNU Too

    Groups 0

      Statistics

      User ID
      109122
      Member since
      22 Mar 2023
      Notices
      30934
      Daily average
      39

      Feeds

      • Atom
      • Help
      • About
      • FAQ
      • TOS
      • Privacy
      • Source
      • Version
      • Contact

      GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

      Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.