GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Taggart :donor: (mttaggart@infosec.exchange)

  1. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Sunday, 11-May-2025 01:43:33 JST Taggart :donor: Taggart :donor:

    This article is both validating and infuriating.

    Validating because it speaks to the lie that generative models are "the worst they'll ever be."

    One popular leaderboard...indicates some “reasoning” models – including the DeepSeek-R1 model from developer DeepSeek – saw double-digit rises in hallucination rates compared with previous models from their developers.

    The myth of incessant improvement needs to die.

    Infuriating because it concludes that "We may have to live with error-prone AI." We really, really don't. This technology has one primary purpose: driving the data and compute hoarding of the oligarchy. It should be considered a tool of the oppressor, and as such should be resisted, confounded, and broken.

    We do not have to accept this.

    https://www.newscientist.com/article/2479545-ai-hallucinations-are-getting-worse-and-theyre-here-to-stay/

    In conversation about 19 hours ago from infosec.exchange permalink
  2. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Friday, 02-May-2025 04:43:43 JST Taggart :donor: Taggart :donor:

    How to win my instant support as a customer:

    "We have decided not to focus on generative AI features, and instead reinvest heavily in quality assurance for our core products through hiring, training, and process development."

    In conversation about 10 days ago from infosec.exchange permalink
  3. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Thursday, 01-May-2025 21:32:25 JST Taggart :donor: Taggart :donor:
    in reply to
    • Kevin Beaumont
    • Will Dormann

    @wdormann @GossiTheDog Were you using Win 11 Enterprise? I also had to set up a "work account" in Entra—personal wouldn't do.

    In conversation about 10 days ago from infosec.exchange permalink
  4. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Thursday, 01-May-2025 21:31:56 JST Taggart :donor: Taggart :donor:
    in reply to
    • Kevin Beaumont
    • Will Dormann

    @wdormann @GossiTheDog Not over here. Now maybe this is because I'm using the Win11-Enterprise image, but for a clean build, you have to make sure you log in a second time with a non-Hello method (which is now basically enforced on first login).

    And even then, I had to make sure enable "Use a Web account" in the RDP client settings.

    In conversation about 10 days ago from gnusocial.jp permalink
  5. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Thursday, 01-May-2025 21:31:56 JST Taggart :donor: Taggart :donor:
    in reply to
    • Kevin Beaumont
    • Will Dormann

    @wdormann @GossiTheDog Okay well the first lesson I'm learning is that even setting up RDP for a Microsoft Account sucks

    In conversation about 10 days ago from gnusocial.jp permalink
  6. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Thursday, 01-May-2025 21:31:56 JST Taggart :donor: Taggart :donor:
    in reply to
    • Kevin Beaumont
    • Will Dormann

    @wdormann @GossiTheDog Labbing this up now

    In conversation about 10 days ago from infosec.exchange permalink
  7. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Thursday, 01-May-2025 21:31:55 JST Taggart :donor: Taggart :donor:
    in reply to
    • Kevin Beaumont
    • Will Dormann

    @wdormann @GossiTheDog But at any rate, with this configuration, I've confirmed that when I change my account password through account.microsoft.com or whatever, the old creds immediately cease to work for RDP access.

    In conversation about 10 days ago from infosec.exchange permalink

    Attachments


  8. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Thursday, 01-May-2025 05:06:58 JST Taggart :donor: Taggart :donor:

    Very cool new FediDB interface

    But wow, only 1.17M MAU? That's even smaller than I thought.

    For comparison, here's a solid breakdown of Bluesky's user stats

    In conversation about 11 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/428/561/584/809/216/original/fbc380436257754c.png
  9. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Thursday, 01-May-2025 05:06:57 JST Taggart :donor: Taggart :donor:
    in reply to
    • boB Rudis 🇺🇦 🇬🇱 🇨🇦

    @hrbrmstr Oh 100% agreed. I understand the why; I just legit thought our MAU here was about double that for some reason.

    In conversation about 11 days ago from infosec.exchange permalink
  10. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Thursday, 01-May-2025 04:52:52 JST Taggart :donor: Taggart :donor:
    • Will Dormann

    Since @wdormann is quoted in this piece and I can't find Dan Wade's handle, I'm tagging him in.

    Is this suggesting that the RDP cred cache never gets updated? Ever ever?

    Also what's up with this?

    Old credentials continue working for RDP—even from brand-new machines.

    That makes no sense at all.

    https://arstechnica.com/security/2025/04/windows-rdp-lets-you-log-in-using-revoked-passwords-microsoft-is-ok-with-that

    In conversation about 11 days ago from infosec.exchange permalink

    Attachments


  11. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Thursday, 01-May-2025 04:52:51 JST Taggart :donor: Taggart :donor:
    in reply to
    • Will Dormann

    @wdormann Okay so this is testable! Do I understand the claim correctly:

    The RDP cache, even when a machine is able to access a domain controller/Entra, will not update, thereby allowing old passwords to work for auth?

    In conversation about 11 days ago from infosec.exchange permalink
  12. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Wednesday, 30-Apr-2025 08:36:15 JST Taggart :donor: Taggart :donor:

    Reading books is apparently resistance.

    Go to the library.

    In conversation about 12 days ago from infosec.exchange permalink
  13. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Tuesday, 29-Apr-2025 01:46:03 JST Taggart :donor: Taggart :donor:

    FWIW, 100% of #ClickFix attacks I've seen have added some kind of inline comment at the end of the command string like I am not a robot to sell the ruse. Definitely worth a threat hunt on command line history.

    #ThreatHunting #ThreatIntel #ThreatIntelligence

    In conversation about 13 days ago from infosec.exchange permalink
  14. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Tuesday, 29-Apr-2025 01:46:02 JST Taggart :donor: Taggart :donor:
    in reply to
    • cR0w :cascadia:

    @cR0w It's a standard EDR feature? But yes, it costs hella ducats. Sysmon is free, but oh lordy the self-hosted SIEM ain't.

    In conversation about 13 days ago from infosec.exchange permalink
  15. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Monday, 28-Apr-2025 02:39:14 JST Taggart :donor: Taggart :donor:

    Politics is the use of power. Replace "No talking about politics," with "No talking about the use of power," and the enforcement of status quo—and its attendant privileges—from this rule become all too clear.

    Your discomfort with the reality of injustice does not oblige me to remain silent.

    In conversation about 14 days ago from infosec.exchange permalink
  16. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Sunday, 27-Apr-2025 22:57:25 JST Taggart :donor: Taggart :donor:
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc It requires a free account, but I use [Streamelements](https;//streamelements.com) and a simple layout to get chat + on-screen events (subs, follows, etc.)

    In conversation about 14 days ago from gnusocial.jp permalink
  17. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Friday, 25-Apr-2025 22:06:45 JST Taggart :donor: Taggart :donor:

    Bluesky going down the verifications rabbit hole in a hilariously hamfisted way. Actually, that's a bit too kind. They're doing it in a way that will makes brands and corpos happy, but fundamentally compromises their stated mission of decentralization. By centralizing verification power, you end up with the same godawful power dynamic of old Twitter.

    https://bsky.app/profile/bsky.app/post/3lndjyjdtq22a

    In conversation about 16 days ago from infosec.exchange permalink
  18. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Saturday, 19-Apr-2025 05:20:01 JST Taggart :donor: Taggart :donor:

    I don't think I've ever been as incredulous about a technique's efficacy as I am with ClickFix. Like you look at it through the lens of expertise and it seems preposterous—who would think Win+R for a CAPTCHA is legit?

    But it works. Users believe it. It's shockingly effective.

    I love users, but the degree to which most of them barely comprehend (and are kind of afraid of) what's going on in the thinking sand can't be overstated.

    In conversation about 23 days ago from infosec.exchange permalink
  19. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Friday, 18-Apr-2025 15:16:23 JST Taggart :donor: Taggart :donor:
    in reply to
    • Viss
    • da_667
    • Ryan Castellucci :nonbinary_flag:

    @ryanc @da_667 @Viss I'll try to whip that one into shape soon. Here are a few other toys I cobbled together, including SSH session spying and instakilling shells from service accounts. https://codeberg.org/mttaggart/bluebpf

    In conversation about 23 days ago from gnusocial.jp permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: codeberg.org
      bluebpf
      from mttaggart
      bluebpf
  20. Embed this notice
    Taggart :donor: (mttaggart@infosec.exchange)'s status on Friday, 18-Apr-2025 15:12:45 JST Taggart :donor: Taggart :donor:
    in reply to
    • Viss

    @Viss I wasn't thinking about hardware, but maybe. I was more in the space of like, an aggressive software tripwire that fires off the fallback defense in the event that EDR is tampered with or some other condition.

    In conversation about 23 days ago from gnusocial.jp permalink
  • Before

User actions

    Taggart :donor:

    Taggart :donor:

    Displaced Philly boy. Threat hunter. Streamer. Educator. #infosec, #programming #rust :rust:, #python :python: #haskell :haskell:, and #javascript :javascript:. #opensource advocate. Runs @thetaggartinstitute. Made https://wtfbins.wtf. Co-creator of https://github.com/mttaggart/OffensiveNotion. Not your bro. All opinions my own. Dad. #fedi22 #searchablePronouns: He/him. M.Ed | Sec+ | CISSP | eCTHPv2 | eWPT | CRTO

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          117593
          Member since
          8 May 2023
          Notices
          143
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.