@briankrebs Everything's getting taken down. What's left to hack? Shit we actually need to stay operational like utilities?
Notices by cR0w :cascadia: (cr0w@infosec.exchange), page 2
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Saturday, 22-Mar-2025 02:18:10 JST cR0w :cascadia:
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 20-Mar-2025 07:01:21 JST cR0w :cascadia:
Veeam isn't used to protect anything important, right? So a sev:CRIT 9.9 RCE shouldn't be a big deal.
A vulnerability allowing remote code execution (RCE) by authenticated domain users.
But it's cool because they're going to blame it on their customers:
Note: This vulnerability only impacts domain-joined backup servers, which is against the Security & Compliance Best Practices.
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 20-Mar-2025 03:02:13 JST cR0w :cascadia:
@kajer Yes please! I'd also like some 169.254.0.0/16 if you've got them.
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 20-Mar-2025 03:02:13 JST cR0w :cascadia:
@kajer If you're handing out certs like that, where can I put in my requests? 😈
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 20-Mar-2025 03:02:12 JST cR0w :cascadia:
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 20-Mar-2025 02:10:22 JST cR0w :cascadia:
@silverwizard INFOSEC as an industry is bad. INFOSEC as a practice, such as encrypted comms while searching for Bigfoot, is good.
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Tuesday, 18-Mar-2025 18:04:31 JST cR0w :cascadia:
People keep posting about destroying or getting rid of Alexa devices because of the blatant creepiness, but I wonder if it would be better to leave them in a box or something away from people with an AM radio playing different stations 24 / 7. I don't know enough about how the Alexa devices work but the idea of creating noise for their creepiness to parse through entertains me.
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 14-Mar-2025 09:24:54 JST cR0w :cascadia:
I knew it was coming but it still sucks. 😡
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 13-Mar-2025 06:39:18 JST cR0w :cascadia:
Being interviewed for someone's clearance six years ago:
Interviewer: Has $subject ever been a part of a plot to overthrow the US government?
Me: HAHA. No.
Interviewer: HAHA. Yeah, I know. We have to ask though.
Being interviewed for someone's clearance three years ago:
Interviewer: Has $subject ever been a part of a plot to overthrow the US government?
Me: No.
Interviewer: Good.
Being interviewed for someone's clearance now:
Interviewer: Has $subject ever been a part of a plot to overthrow the US government?
Me: No.
Interviewer: That's too bad. Thanks for your time.
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 13-Mar-2025 02:05:59 JST cR0w :cascadia:
This is a big deal because I was told ( unofficially, grain of salt ) that Niantic was specifically collecting the location data from Ingress and Pokemon Go in order to map all types of travel routes for certain defense operations. For example: if 20 players walked 20 different routes through a park while playing, all 20 routes and their overlap is now mapped as foot paths. If it thought you were on a bike, in a car, etc. those routes are mapped, regardless of whether they were on actual trails or roads or private property. See where I'm going with my concern here?
https://www.404media.co/saudi-arabia-buys-pokemon-go-and-probably-all-of-your-location-data/
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Wednesday, 12-Mar-2025 22:20:27 JST cR0w :cascadia:
@Sempf WTF is this "maybe" shit? You can't just dangle that out there and hide it behind your back again. We're not cats. Well, we're not all cats.
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Wednesday, 12-Mar-2025 00:27:35 JST cR0w :cascadia:
The Pihole and uBlock projects get a lot of love, as they should, but shout out to the people maintaining the lists for those adblocking projects and others. I just realized that unless you are involved in those kinds of efforts, most people don't even know that work is going on by, as far as I can tell, volunteers. 🍻
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Tuesday, 11-Mar-2025 01:27:23 JST cR0w :cascadia:
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Sunday, 09-Mar-2025 01:38:11 JST cR0w :cascadia:
Between ingesting private repos into Copilot and the high-profile infostealer this week, on top of the whole American ownership thing, I can't believe there isn't more open discussion about getting off GitHub completely so the entire domain can be blocked.
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Saturday, 08-Mar-2025 16:20:58 JST cR0w :cascadia:
@richi Ban all network gear with "link" anywhere in its name.
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 07-Mar-2025 23:49:40 JST cR0w :cascadia:
@GossiTheDog I'm sure they're just honeypots and not actually vulnerable corp access points...
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 07-Mar-2025 13:19:01 JST cR0w :cascadia:
@da_667 @GossiTheDog Or allowing users to log into browsers with their personal profiles because they say it's easier for them.
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 07-Mar-2025 10:12:30 JST cR0w :cascadia:
So Microsoft Edge is moving to MV3, disabling the best ad blocking protections available to end users, at the same time Microsoft Security pats itself on the back for taking down malware that has been hosted on Microsoft GitHub long enough to infect 1 million browsers through malicious ads that could have been easily blocked by MV2 ad blockers. Did I get that right? Just making sure.
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Wednesday, 05-Mar-2025 00:55:08 JST cR0w :cascadia:
@GossiTheDog I thought this one was discussed when it came out because MSRC changed it from exploited:no to exploited:yes the day after it was originally published. I think it was in a screaminggoat thread though so I can't search for it anymore.
-
Embed this notice
cR0w :cascadia: (cr0w@infosec.exchange)'s status on Tuesday, 04-Mar-2025 07:33:29 JST cR0w :cascadia:
@jerry I'm not a financial person, but with the craziness going on, it feels like even the historically safe money markets and bonds are no longer safe. Is that your understanding too?