@mttaggart @Viss all the 2024 CVE growth has been Wordpress plugin bug bounty sites (like wordfence) and the Linux kernel
Notices by Josh Bressers (joshbressers@infosec.exchange), page 3
-
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Wednesday, 27-Nov-2024 05:59:51 JST Josh Bressers
-
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Tuesday, 26-Nov-2024 08:03:59 JST Josh Bressers
@grimmy hah, the ui is terrible
But this is a great public conversation :)
-
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Tuesday, 26-Nov-2024 07:59:46 JST Josh Bressers
@grimmy that’s awesome. Let’s try to set something up soon. I’ll see about figuring it a schedule after Thanksgiving
-
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Tuesday, 26-Nov-2024 07:51:38 JST Josh Bressers
"I'm afraid you're going to have to accept it. This torment nexus has got to be built and it's going to be built!"
"First I've heard of it," said Arthur, "why's it got to be built?"
"What do you mean, why's it got to be built?" he said. "It's a torment nexus. You've got to build torment nexus.
-
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Tuesday, 26-Nov-2024 00:44:19 JST Josh Bressers
@pvn Basically, yes
-
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Tuesday, 26-Nov-2024 00:24:11 JST Josh Bressers
@simplenomad @kurtseifried Thanks!
-
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Tuesday, 26-Nov-2024 00:02:55 JST Josh Bressers
The #NVD API has been broken for a few days now
At least they updated their status page
https://www.nist.gov/itl/nvd -
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Monday, 25-Nov-2024 10:59:48 JST Josh Bressers
@allanfriedman this seems related to your question about support the other day
-
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Sunday, 24-Nov-2024 23:16:39 JST Josh Bressers
@osmodia I'll try to write this down nicely at some point in the future
I have GND, 5v, and tx/rx connected between the pi and Heltec
Then you have to configure the pi to enable the serial port (I used raspi-config)
Then you can tell meshtastic or the bbs to use /dev/ttyS0 as the serial port (this port isn't tried by default for anything it seems)
-
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Saturday, 23-Nov-2024 13:21:35 JST Josh Bressers
Tonight’s project was connecting a #Meshtastic node to a raspberry pi zero using GPIO
The 4 pins I needed almost lined up exactly, which was nice
Now it’ll run the BBS I’m working on
https://github.com/joshbressers/meshbbs -
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Friday, 22-Nov-2024 08:37:42 JST Josh Bressers
In the case of any list, if you're actually doing it right, things should be dropping off the list
I'm not sure anything has ever really come off any security list because an effort was made to get rid of it
Maybe if CISAs push to stop using memory unsafe languages, in 200 years, we can remove buffer overflows :P
In conversation from infosec.exchange permalink -
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Friday, 22-Nov-2024 08:31:29 JST Josh Bressers
The two obvious lists that get the most attention are the OWASP Top Ten and this new list from MITRE
Then when I realized they probably ARE the most effective lists around, it made me sad
In conversation from infosec.exchange permalink -
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Friday, 22-Nov-2024 02:29:20 JST Josh Bressers
The most effective security efforts are lists of vulnerabilities that minimally change every time they are updated
This was meant to be a joke, but then I realized it's also true
In conversation from infosec.exchange permalink -
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Friday, 22-Nov-2024 01:21:56 JST Josh Bressers
@allanfriedman @kurtseifried @mkolsek
In the analog world, I would probably bucket this into the "aftermarket" category, but it still a bit different
In conversation from infosec.exchange permalink -
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Friday, 22-Nov-2024 00:49:08 JST Josh Bressers
@allanfriedman @kurtseifried I have minimal experience with the closed source universe, but this is sort of the commercial Linux distribution model
Folks like Red Hat, Suse, and Canoncial support open source they didn't write, sometimes for a decade
Long after the upstream has given up on those versions
In conversation from infosec.exchange permalink -
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Friday, 22-Nov-2024 00:39:52 JST Josh Bressers
@allanfriedman I don't understand what you mean by "3rd party software support"
In conversation from infosec.exchange permalink -
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Thursday, 21-Nov-2024 10:38:53 JST Josh Bressers
@kurtseifried probably decades :)
In conversation from infosec.exchange permalink -
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Thursday, 21-Nov-2024 09:45:20 JST Josh Bressers
You can buy a jug of McRib sauce, just in time for Christmas!!!
In conversation from infosec.exchange permalink -
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Thursday, 21-Nov-2024 08:27:37 JST Josh Bressers
@foo this caused me to spend more time than I want to admit fiddling with my monitor today
In conversation from infosec.exchange permalink -
Embed this notice
Josh Bressers (joshbressers@infosec.exchange)'s status on Thursday, 21-Nov-2024 05:09:32 JST Josh Bressers
@JoshCGrossman I know a place you can tell such stories :)
Shoot me a DM if you ever want to be a guest (no rush, the invite doesn't expire)
In conversation from infosec.exchange permalink Attachments