GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Tanawts (enigma@infosec.exchange)

  1. Embed this notice
    Tanawts (enigma@infosec.exchange)'s status on Saturday, 05-Apr-2025 04:25:51 JST Tanawts Tanawts

    OK folks, I am hiring in the Seattle area for a SOC position. I am looking for candidates that have prior experience in CorpSec.

    Please help me get the word out, and reach out to me if you or someone you know is interested!

    https://careers.redfin.com/us/en/job/57086/Security-Operations-Engineer

    In conversation about a month ago from infosec.exchange permalink
  2. Embed this notice
    Tanawts (enigma@infosec.exchange)'s status on Wednesday, 19-Mar-2025 14:49:54 JST Tanawts Tanawts
    • Kevin Beaumont

    @GossiTheDog am i tripping? Who watches the watchers?

    https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised

    Github seems to only have logs for the git protocol usage itself, but I dont seem to see logs for interactions like views on the www.github.com web portal itself, eg. for things like who logged in to the web portal and viewed workflow logs that would contain base64 double encoded passwords.

    Bing/CoPilot has an unsatisfactory answer as well:

    "How do I audit github for people who looked at github workflow logs

    Unfortunately, GitHub doesn't provide a straightforward way to see who has viewed workflow logs. Logs are generally accessible to anyone with sufficient permissions in a repository, but GitHub doesn't track or display individual views on these logs."

    I don't think github logs access to github
    I think github logs access to git

    In conversation about 2 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: github.githubassets.com
      GitHub: Where the world builds software
      GitHub is where over 83 million developers shape the future of software, together. Contribute to the open source community, manage your Git repositories, review code like a pro, track bugs and feat...
  3. Embed this notice
    Tanawts (enigma@infosec.exchange)'s status on Sunday, 15-Sep-2024 23:34:36 JST Tanawts Tanawts
    • Kevin Beaumont

    @GossiTheDog yes, but do those max settings Look pretty? ;)

    In conversation about 8 months ago from infosec.exchange permalink
  4. Embed this notice
    Tanawts (enigma@infosec.exchange)'s status on Saturday, 07-Sep-2024 17:22:00 JST Tanawts Tanawts

    Endeavor to be the prism in the windchime

    Wield what is taken for granted and considered mundane in life

    Create music from the air, and fracture the light into rainbows of brilliance that dance to the tune

    Help others hear the melody, to see the beauty, and remember that the greatest thing you'll ever learn is just to love and be loved in return

    In conversation about 8 months ago from infosec.exchange permalink
  5. Embed this notice
    Tanawts (enigma@infosec.exchange)'s status on Saturday, 03-Feb-2024 03:19:06 JST Tanawts Tanawts

    There is a reoccurring Tactic, Technique, and Procedure (TTP) that threat actors have been demonstrating as highly effective.
    It was most notably used by Lapsus$ and you can see the behavior Copy+Pasted in the majority of recent attacks:

    Opportunistic Compromise of an account -> Pour over generally unrestricted internal docs/wikis/repos -> obtain design details -> use discovered unremeditated creds for informed lateral movement/follow up attacks with more specific deeper objectives/targets.

    In conversation about a year ago from infosec.exchange permalink
  6. Embed this notice
    Tanawts (enigma@infosec.exchange)'s status on Saturday, 03-Feb-2024 03:19:04 JST Tanawts Tanawts
    in reply to

    Big Takeaway for Engineering Teams & Business Leadership is -- You can no longer rely on the false sense of security-through-obscurity of your internal designs; attackers are deliberately targeting these for surgical strikes and it is no longer sensible to believe "the bad guys don't know how to attack our complex private internal systems/services because they don't understand how its put together"; in reality they may very well understand it better than your own employees.

    In conversation about a year ago from infosec.exchange permalink
  7. Embed this notice
    Tanawts (enigma@infosec.exchange)'s status on Wednesday, 31-Jan-2024 00:31:43 JST Tanawts Tanawts
    in reply to
    • Kevin Beaumont

    @GossiTheDog Remember when folks were bummed when Naughty Dog said: We made this really cool Online Multiplayer Last of Us game... but we've made a company decision NOT to be a Live Games company and instead focus on our Core Experience? Hat's off to them for recognizing the challenge and sticking to convictions.

    Oooof Rocksteady has been demonstrating the big pitfalls of trying to go from a rich stand-alone game dev model to having to staff and Support Live Online Services

    :|

    In conversation about a year ago from infosec.exchange permalink
  8. Embed this notice
    Tanawts (enigma@infosec.exchange)'s status on Tuesday, 30-Jan-2024 08:56:01 JST Tanawts Tanawts
    • Kevin Beaumont

    @GossiTheDog Of course my friend!

    https://telegra.ph/How-to-Receive-Microsoft-Breach-Notifications-10-21

    In conversation about a year ago from infosec.exchange permalink
  9. Embed this notice
    Tanawts (enigma@infosec.exchange)'s status on Thursday, 25-Jan-2024 09:04:44 JST Tanawts Tanawts
    • Kevin Beaumont

    @GossiTheDog just wait for all the fun once the psyops and cyberops start flying in full swing leading up to the election

    In conversation about a year ago from infosec.exchange permalink
  10. Embed this notice
    Tanawts (enigma@infosec.exchange)'s status on Monday, 22-Jan-2024 04:15:48 JST Tanawts Tanawts
    in reply to
    • Kevin Beaumont
    • Alex Stamos

    @GossiTheDog @alex -- I don't think this was from: Spraying M365 Mailbox accounts... Reading between those lines, "Non-Prod-Test-Tenant Account" That sounds a whole lot more like a 'Service Account/Machine Account" used for a Proof of concept tool/service; automation accounts aren't going to have MFA.

    There are a great many different services/tools that are granted delegated access to various different things, email being accessed sounds to me that perhaps it was an automation service meant to trigger actions based on access to mail content/interaction.

    In conversation about a year ago from infosec.exchange permalink
  11. Embed this notice
    Tanawts (enigma@infosec.exchange)'s status on Friday, 08-Sep-2023 11:55:43 JST Tanawts Tanawts

    InfoSec family, I see you and I love you

    In conversation Friday, 08-Sep-2023 11:55:43 JST from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosecmediaeu/media_attachments/files/111/026/098/257/704/586/original/0c2b07b5ed50d02b.webp

User actions

    Tanawts

    Tanawts

    Things are not always what they seemRedfin | Rent Head of Information SecurityFormer Ubisoft Director of Security OperationsMicrosoft Alumni | Former Director of MSRC's Cloud Incident Response | He/Him/Hrm | Philosopher & NinjaSANS: GCIH #16353 - Cerified Incident HandlerGWAPT #3274- Web Application Pen TesterGXPN #164 - Exploit Researcher and Advanced Penetration Tester

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          168805
          Member since
          8 Sep 2023
          Notices
          11
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.