GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by BrianKrebs (briankrebs@infosec.exchange)

  1. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Wednesday, 02-Jul-2025 02:41:00 JST BrianKrebs BrianKrebs

    JD Vance apparently cast the tiebreaking vote on the big GOP tax giveaway. Fitting outcome for the most gutless, rapacious and myopic Congress ever.

    https://www.nytimes.com/live/2025/07/01/us/trump-bill-news

    In conversation about 2 hours ago from infosec.exchange permalink
  2. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Tuesday, 01-Jul-2025 23:24:59 JST BrianKrebs BrianKrebs

    I resemble this comment.

    https://www.nytimes.com/interactive/2025/06/30/opinion/hhs-cuts-harming-american-health.html

    In conversation about 5 hours ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/778/421/931/629/472/original/1348f9f50ca8e9ad.png
  3. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Tuesday, 01-Jul-2025 06:01:57 JST BrianKrebs BrianKrebs

    FBI agents briefed Capitol Hill staff recently on hardening the security of their mobile devices, after a contacts list stolen from the personal phone of the White House Chief of Staff Susie Wiles was reportedly used to fuel a series of text messages and phone calls impersonating her to U.S. lawmakers. But in a letter this week to the FBI, Sen. Ron Wyden (D-Ore.) says the feds aren’t doing enough to recommend more appropriate security protections that are already built into most consumer mobile devices.

    https://krebsonsecurity.com/2025/06/senator-chides-fbi-for-weak-advice-on-mobile-security/

    In conversation about a day ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/774/310/777/812/325/original/2c82e6526606a39c.png
  4. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Wednesday, 25-Jun-2025 19:22:12 JST BrianKrebs BrianKrebs

    Found a bald-faced hornet's nest near the house -- right in the middle of the garden. These things are about the most aggressive stinging insects I've come across. Our dog loves to bat at the bees when she's bored, no matter how many times I tell her to be nice and that she's going to regret it. I've never seen her get stung,, but they're also usually bumblebees or slower insects she's picking on. Last night, she picked a fight with a bald-faced hornet that stung her at least once and then stung me 3 times and somehow managed to still hang on to me while we both fled indoors. Then while we were frantically searching for this menace it sneaked up and stung me again in the neck. It took about 5 minutes to corner it and kill it.

    After I squashed him I looked him up: They are apparently known for being aggressively defensive, swarming anything that gets too close, and they can sting over and over w/out losing their stinger or dying. I also read this little terrifying factoid: These things *can recognize human faces* and can send out pheromones to tell their fellow hornets who to attack. So now I'm wanted in my own front yard. It's like raptors own the yard or something.

    I think it's time to call a professional. No way I'm going near that area again. I can't imagine the pain a whole bunch of those things could cause all at once.

    In conversation about 6 days ago from infosec.exchange permalink
  5. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Wednesday, 25-Jun-2025 14:55:51 JST BrianKrebs BrianKrebs

    So many missed headline opportunities. Balls Dropped. Sacked. It goes on and on.

    https://www.wired.com/story/big-balls-coristine-doge-resigned-us-government/

    In conversation about 7 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/741/613/865/013/476/original/9cbaf2d2a16283f3.png
  6. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Sunday, 15-Jun-2025 09:37:39 JST BrianKrebs BrianKrebs

    A steady rain has moved into the DC area. Visibility is not great. Whoever ordered it to rain on his parade, <chef's kiss>

    In conversation about 17 days ago from infosec.exchange permalink
  7. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Saturday, 14-Jun-2025 02:42:05 JST BrianKrebs BrianKrebs

    IDK why, but out of all the horrible, no good, very depressing news on the front pages today, this one stuck in my head the most so far. From WaPo:

    "At least several months ago, Israel’s top spy agency, the Mossad, began to smuggle missiles into Iran and secretly installed swarms of explosive drones deep inside the country, laying the groundwork for a devastating Israeli surprise attack on Friday morning. As Israel launched its air attack, the Mossad activated its planted drones, which struck missile launchers at a base near Tehran, a senior Israeli official said, speaking on the condition of anonymity to discuss intelligence operations."

    But sure, let's spend a bajillion dollars building a nationwide golden ICBM shield.

    https://www.washingtonpost.com/world/2025/06/12/israel-attacks-iran-tehran-explosions/#link-SFGHTH4RRVBZJPJXL2ZBVMJY5I

    In conversation about 18 days ago from infosec.exchange permalink
  8. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 13-Jun-2025 09:56:06 JST BrianKrebs BrianKrebs

    New, by me: A Dark Adtech Empire Fed by Fake CAPTCHAs

    Late last year, security researchers made a startling discovery: Kremlin-backed disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising technology that powers a sprawling ecosystem of online hucksters and website hackers. A new report on the fallout from that investigation finds this dark ad tech industry is far more resilient and incestuous than previously known.

    https://krebsonsecurity.com/2025/06/inside-a-dark-adtech-empire-fed-by-fake-captchas/

    In conversation about 19 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/673/073/969/079/951/original/e6237f5aefd0f504.png
  9. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 06-Jun-2025 23:41:02 JST BrianKrebs BrianKrebs

    Really enjoyed David Gerard's amusing take on how programming with AI becomes like a gambling addiction for many.

    "Large language models work the same way as a carnival psychic. Chatbots look smart by the Barnum Effect — which is where you read what’s actually a generic statement about people and you take it as being personally about you. The only intelligence there is yours."

    "With ChatGPT, Sam Altman hit upon a way to use the Hook Model with a text generator. The unreliability and hallucinations themselves are the hook — the intermittent reward, to keep the user running prompts and hoping they’ll get a win this time."

    "This is why you see previously normal techies start evangelising AI coding on LinkedIn or Hacker News like they saw a glimpse of God and they’ll keep paying for the chatbot tokens until they can just see a glimpse of Him again. And you have to as well. This is why they act like they joined a cult. Send ’em a copy of this post."

    https://pivot-to-ai.com/2025/06/05/generative-ai-runs-on-gambling-addiction-just-one-more-prompt-bro/

    In conversation about a month ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: pivot-to-ai.com
      Generative AI runs on gambling addiction — just one more prompt, bro!
      You’ll have noticed how previously normal people start acting like addicts to their favourite generative AI and shout at you like you’re trying to take their cocaine away. Matthias Döpm…
  10. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 06-Jun-2025 20:41:05 JST BrianKrebs BrianKrebs

    PSA: After getting duly sanctioned last month by the EU for being a conduit for Russian disinformation and cyberattacks, the people behind the massive bulletproof hosting service known as Stark Industries Solutions Inc are rebranding.

    Stark's two sanctioned owners -- the Neculiti brothers -- have operated Stark via a related business called PQ Hosting, which is now changing its name to the[.]hosting.

    "The PQ.Hosting project no longer exists — neither as a legal entity nor as an operational structure. From the moment of transition, full control over all operational and technical activities has passed to new owners with no connection to the previous management or beneficiaries."

    Uh huh.

    https://the.hosting/en/news/pqhosting-thehosting-important-news-about-the-companys-transformation

    In conversation about a month ago from infosec.exchange permalink
  11. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 06-Jun-2025 12:41:29 JST BrianKrebs BrianKrebs

    I learned a lot writing this, and there is a lot more here to pick at.

    Ukraine has seen nearly one-fifth of its Internet space come under Russian control or sold to Internet address brokers since February 2022, a new study finds. The analysis indicates large chunks of Ukrainian Internet address space are now in the hands of shadowy proxy and anonymity services that are nested at some of America’s largest Internet service providers (ISPs).

    "...A cursory review of all Internet address blocks currently routed through AT&T — as seen in public records maintained by the Internet backbone provider Hurricane Electric — shows a preponderance of country flags other than the United States, including networks originating in Hungary, Lithuania, Moldova, Mauritius, Palestine, Seychelles, Slovenia, and Ukraine.

    Asked about the apparent high incidence of proxy services routing foreign address blocks through AT&T, the telecommunications giant said it recently changed its policy about originating routes for network blocks that are not owned and managed by AT&T. That new policy, spelled out in a February 2025 update to AT&T’s terms of service, gives those customers until Sept. 1, 2025 to originate their own IP space from their own autonomous system number (ASN), a unique number assigned to each ISP (AT&T’s is AS7018).

    https://krebsonsecurity.com/2025/06/proxy-services-feast-on-ukraines-ip-address-exodus/

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/633/408/503/928/526/original/475ed91243fea115.png
  12. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 05-Jun-2025 00:22:46 JST BrianKrebs BrianKrebs

    Attendee at a recent talk: "You're the reason I got into security."

    Me: "I'm really sorry."

    In conversation about a month ago from infosec.exchange permalink
  13. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Tuesday, 03-Jun-2025 03:46:19 JST BrianKrebs BrianKrebs

    It's not every day your name is on the top of the Google Cloud blog. Google's engineers wrote about the ginormous 6.3 terabits per second attack on KrebsOnSecurity.com on May 12.

    "In the May incident, the attacker sent large data packets to random ports at a rate of approximately 585 million packets per second, which is over 1,000 times the usual rate for KrebsOnSecurity."

    https://cloud.google.com/blog/products/identity-security/project-shield-blocked-a-massive-recent-ddos-attack-heres-how

    Here's my May 20 story about the attack:
    https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/

    In conversation about a month ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: krebsonsecurity.com
      Krebs on Security
      In-depth security news and investigation
    2. Domain not in remote thumbnail source whitelist: krebsonsecurity.com
      KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
      KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been…

    3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/614/640/200/347/680/original/ac1ae8c82abfee2b.png
    4. No result found on File_thumbnail lookup.
      Google Cloud Blog
  14. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 30-May-2025 02:33:16 JST BrianKrebs BrianKrebs

    The closing thank you slide in my talk yesterday had my profile photo from here and a link to my profile, and I actually had multiple people come up afterward saying they were signing up here after meaning to for some time. Guess I'll keep that as my last slide going forward.

    In conversation about a month ago from infosec.exchange permalink
  15. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 30-May-2025 00:03:45 JST BrianKrebs BrianKrebs

    In January, I wrote about a vast China-based cloud CDN called Funnul that catered to cybercriminals in China and Russia seeking to route their traffic through US-based Cloud providers, particularly Microsoft and Amazon.

    https://krebsonsecurity.com/2025/01/infrastructure-laundering-blending-in-with-the-cloud/

    I did not expect this, or so quickly, but it looks like Treasury just sanctioned Funnel, calling it a major scam distributor.

    https://home.treasury.gov/news/press-releases/sb0149

    January's story was based on research by Silent Push, which found a large number of domains hosted via Funnull promoting gambling sites that bear the logo of the Suncity Group, a Chinese entity named in a 2024 UN report (PDF) for laundering millions of dollars for the North Korean Lazarus Group.

    In 2023, Suncity’s CEO was sentenced to 18 years in prison on charges of fraud, illegal gambling, and “triad offenses,” i.e. working with Chinese transnational organized crime syndicates. Suncity is alleged to have built an underground banking system that laundered billions of dollars for criminals.

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/591/715/645/605/357/original/526328ee25c97fb5.png

  16. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 23-May-2025 14:04:57 JST BrianKrebs BrianKrebs
    in reply to

    LOL. I posted the same thing on LinkedIn just as like an FYI, and within minutes the post attracted a comment from a scam HR recruiter whose account is 5 days old.

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/554/364/627/566/345/original/4a4362bb13b1fdb6.png
  17. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 23-May-2025 12:28:51 JST BrianKrebs BrianKrebs
    in reply to

    There are a number of AI platforms now that will allow people to engage agentic AI bots, and I have to say these places are generally libertarian utopias. It's kind of like CoPilot, but w/out any of the ethical and security guardrails.

    Come to think of it, we're not far from a future in which nation states are founded on the idea that AI should be unbridled by laws and regulations.

    In conversation about a month ago from infosec.exchange permalink
  18. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 23-May-2025 12:27:52 JST BrianKrebs BrianKrebs
    in reply to

    Just FYI, I was asked to talk about what's ahead for AI and then freaked out because I don't know anything about AI. So I set aside a few days to sit w/ a couple of the best red-teamers I know.

    Tl;dr: one told it to mimic the IT infrastructure of the target environment, and then run a battery of tests using APIs for some vulnerability testing services. He told it to dox the employees of the targeted company; to provide a roadmap for exploitable vulnerabilities. It did all this and more. The expert said the resulting report produced by the agentic AI bot was the equivalent of an entire team of red-teamers working for a week. The compute time cost less than $10.

    In conversation about a month ago from infosec.exchange permalink
  19. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 23-May-2025 12:21:57 JST BrianKrebs BrianKrebs

    Oh yay. Our dystopian AI agentic future is now at 4.0

    https://news.ycombinator.com/item?id=44063703

    For a clue at how new agentic AI is for most noobs (including me), agentic is not even technically a globally accepted word yet AFAICT.

    In conversation about a month ago from infosec.exchange permalink
  20. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 23-May-2025 12:21:56 JST BrianKrebs BrianKrebs
    in reply to

    As much as I detest the term "agentic AI" for all that it stands for, it's a term that everyone should understand and be conversant about. If you thought we had problems already with systems being compromised by botnets, wait until everyone and his mom starts handing control over their system to agentic AI. It won't be long now.

    In conversation about a month ago from infosec.exchange permalink
  • Before

User actions

    BrianKrebs

    BrianKrebs

    Independent investigative journalist. Covers cybercrime, security, privacy. Author of 'Spam Nation,' a NYT bestseller. Former Washington Post reporter, '95-'09. Signal: briankrebs.07 krebsonsecurity @ gmail .comLinkedin: https://www.linkedin.com/in/bkrebs

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          21764
          Member since
          9 Nov 2022
          Notices
          400
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.