GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by BrianKrebs (briankrebs@infosec.exchange)

  1. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Saturday, 13-Sep-2025 07:30:16 JST BrianKrebs BrianKrebs
    in reply to

    My tepid post doesn't delve into the other benefits of sortition: namely, the money part.

    In conversation about 13 hours ago from infosec.exchange permalink
  2. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Saturday, 13-Sep-2025 07:30:15 JST BrianKrebs BrianKrebs
    in reply to

    Seriously: How much is too much to spend on a presidential campaign? $2 billion? $5 billion? No limit? At some point, you almost guarantee that you're being bought by interests you can't control.

    In conversation about 13 hours ago from infosec.exchange permalink
  3. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Saturday, 13-Sep-2025 07:08:36 JST BrianKrebs BrianKrebs

    I've joked about this before, but maybe it's time to think about bringing back the (really) old Democratic idea of "sortition," or choosing elected officials by some kind of lottery. The idea being that maybe the best candidate is someone who doesn't actually want the job. Considering how many people now in Congress who don't seem to have two brain cells to rub together, maybe it's not such a bad idea? <ducks>

    https://en.wikipedia.org/wiki/Sortition

    In conversation about 13 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: upload.wikimedia.org
      Sortition
      In governance, sortition is the selection of public officials or jurors at random, i.e. by lottery, in order to obtain a representative sample. In ancient Athenian democracy, sortition was the traditional and primary method for appointing political officials, and its use was regarded as a principal characteristic of democracy. Sortition is often classified as a method for both direct democracy and deliberative democracy. Today sortition is commonly used to select prospective jurors in common-law systems. What has changed in recent years is the increased number of citizen groups with political advisory power, along with calls for making sortition more consequential than elections, as it was in Athens, Venice, and Florence. History Ancient Athens Athenian democracy developed in the 6th century BC out of what was then called isonomia (equality of law and political rights). Sortition was then the principal way of achieving this fairness. It was utilized to pick most of the magistrates for their governing committees, and for their juries (typically...
  4. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Saturday, 13-Sep-2025 00:17:32 JST BrianKrebs BrianKrebs

    Grammarly's latest jingle "You probably already have a Grammarly account..." I better fucking not!

    In conversation about 20 hours ago from infosec.exchange permalink
  5. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 12-Sep-2025 03:57:45 JST BrianKrebs BrianKrebs

    New, from me:

    In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and disinformation campaigns. But new findings show those sanctions have done little to stop Stark from simply rebranding and transferring their assets to other corporate entities controlled by its original hosting providers.

    https://krebsonsecurity.com/2025/09/bulletproof-host-stark-industries-evades-eu-sanctions/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/186/899/324/855/812/original/ccdd9bba9daec7c5.png
  6. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 11-Sep-2025 04:30:42 JST BrianKrebs BrianKrebs

    I'd pay for a high-quality handmade sketch (a good one, not some stick figures) that depicts what I desperately want to ask AI to devise just because I like the idea of asking it to imagine its own demise: I'm picturing a scene where the data centers have been overgrown with dangling vines and weeds creeping out of server cabinets, which have long ago been stripped for scarce parts in the battle against the machines. I'd settle for a more gently apocalyptic theme as well.

    In conversation about 3 days ago from infosec.exchange permalink
  7. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 11-Sep-2025 03:39:14 JST BrianKrebs BrianKrebs

    Democracy in the US is under serious threat by a deranged orange comestible, but you wouldn't see any signs of that from watching the absolutely delusional stock market, which seems to only care about AI stocks continuing to lift the entire market thanks to their outsized value in it and all the wealth tied up in some fairly shaky but critical assumptions.

    In other news, Financial Times reports just now that Oracle's market value jumped $200B thanks to a surge in AI investment, taking Larry Ellison's worth to that of Elon Musk.

    In conversation about 3 days ago from infosec.exchange permalink
  8. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 11-Sep-2025 01:38:15 JST BrianKrebs BrianKrebs

    Jimmy Kimmel has been must-watch over the past few days. Total 🔥 monologues. Also, Spinal Tap!

    https://www.youtube.com/watch?v=YTRXOW4Mm0w

    https://www.youtube.com/watch?v=BuEwkh24tYI

    In conversation about 3 days ago from infosec.exchange permalink
  9. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Wednesday, 10-Sep-2025 04:59:47 JST BrianKrebs BrianKrebs

    Alternative headline: Biggest purveyor of bullshit machines complains there's too much bullshit on the interwebs.

    https://techcrunch.com/2025/09/08/sam-altman-says-that-bots-are-making-social-media-feel-fake/

    In conversation about 4 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: techcrunch.com
      Sam Altman says that bots are making social media feel 'fake'  | TechCrunch
      from Julie Bort
      After watching Reddit's OpenAI and Anthropic communities, Sam Altman thinks social media cannot be trusted. And bots are to blame.

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/175/924/180/214/712/original/9ec3bc0288b2081d.png
  10. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Tuesday, 09-Sep-2025 22:35:04 JST BrianKrebs BrianKrebs

    After slogging through too many vapid posts over the last few weeks, I find this very cathartic: The loose confederation of criminals from the Com who claim to be responsible for the recent Salesforce and Salesloft data theft incidents have been taunting authorities for weeks, "FBI can't arrest us," "Why aren't we arrested already" etc, the usual bravado. Now that more of them are arrested (details tbd), their response is "This channel is now closed and we're going away for a while. Thanks."

    We'll see about the "a while" part, although really anyone can claim to be members of the Scattered Shiny Spiders, or whatever the hell "they" want to call themselves.

    In conversation about 4 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/174/565/130/207/530/original/1b145b9a49010b0d.png
  11. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Tuesday, 09-Sep-2025 08:12:28 JST BrianKrebs BrianKrebs
    • Kevin Beaumont

    New, from me:

    At least 18 popular JavaScript code packages that are collectively downloaded more than two billion times each week were briefly compromised with malicious software today, after a developer involved in maintaining the projects was phished. The attack appears to have been quickly contained and was narrowly focused on stealing cryptocurrency. But experts warn that a similar attack with a slightly more nefarious payload could quickly lead to a disruptive malware outbreak that is far more difficult to detect and restrain.

    https://krebsonsecurity.com/2025/09/18-popular-code-packages-hacked-rigged-to-steal-crypto/

    The story includes perspectives from @GossiTheDog who has been following this saga all day today w/ updates here.

    https://infosec.exchange/@GossiTheDog@cyberplace.social/115169882087261187

    In conversation about 5 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/171/155/310/672/457/original/4741db62197a025b.png
    2. No result found on File_thumbnail lookup.
      Kevin Beaumont (@GossiTheDog@cyberplace.social)
      from Kevin Beaumont
      For anybody confused about how this happens, basically: - For about the past 15 years every business has been developing apps by pulling in 178 interconnected libraries written by 24 people in a shed in Skegness - For about the past 2 years orgs have been buying AI vibe coding tools, where some exec screams "make online shop" into a computer and 389 libraries are added and an app is farted out The output = if you want to own the world's companies, just phish one guy in Skegness
  12. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Saturday, 06-Sep-2025 19:36:06 JST BrianKrebs BrianKrebs

    New, by me: GOP Cries Censorship Over Spam Filters That Work

    The chairman of the Federal Trade Commission (FTC) last week sent a letter to Google's CEO demanding to know why Gmail was blocking messages from Republican senders while allegedly failing to block similar missives supporting Democrats. The letter followed media reports accusing Gmail of disproportionately flagging messages from the GOP fundraising platform WinRed and sending them to the spam folder. But according to experts who track daily spam volumes worldwide, WinRed's messages are getting blocked more because its methods of blasting email are increasingly way more spammy than that of ActBlue, the fundraising platform for Democrats.

    https://krebsonsecurity.com/2025/09/gop-cries-censorship-over-spam-filters-that-work/

    In conversation about 7 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/155/212/204/050/340/original/92527b2c8b9fe8e6.png
  13. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Saturday, 06-Sep-2025 07:16:57 JST BrianKrebs BrianKrebs

    #StreisandEffect

    Copying an archive.is link of this OregonLive.com story because it probably deserves more attention and is behind a paywall:

    "A former University of Oregon undergraduate who says he discovered a significant security flaw in the college’s computer network and twice reported it to university officials faced a disciplinary hearing as a result."

    "Physics major Owen Mitchem said he was able to inadvertently access confidential information, including the Social Security numbers of more than 3,500 public university employees around the state, last fall, including of the university’s president and its football coach, the highest-paid public employee in the state. He says the breach should have been a wake-up call for the university to tighten its online security."

    "But according to an email the university provided to The Oregonian/OregonLive in response to a public records request, the university’s associate dean of students, Dianne Tanjuaquio, concluded that Mitchem’s actions violated the school’s policies on “acceptable use of computing resources.” She required him to write a 750-word essay reflecting on the situation; if not completed, he could face a suspension of his student account, preventing him from registering for classes or changing his course schedule."

    "Mitchem says he was just searching in Microsoft Teams for some budget figures for the physics club he ran when he stumbled across a spectrum of university financial documents, visible via files on SharePoint, a Microsoft tool that can be integrated with Teams. They seemed harmless at first glance, he told The Oregonian/OregonLive, but not something his student email permissions should have allowed him to view."

    "Mitchem alerted a physics department grants technician and assumed the wide access would be quickly corrected. He later found out that the technician hadn’t alerted the university’s information department, meaning that unbeknownst to him, the IT department remained unaware of the security lapse, Mitchem said via email."

    https://archive.is/rG2KG

    In conversation about 8 days ago from infosec.exchange permalink

    Attachments


    1. No result found on File_thumbnail lookup.
      Oregon Local News, Breaking News, Sports & Weather
      Get the latest Oregon Local News, Sports News & US breaking News. View daily OR weather updates, watch videos and photos, join the discussion in forums. Find more news articles and stories online at OregonLive.com

  14. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 04-Sep-2025 10:23:47 JST BrianKrebs BrianKrebs

    Sen. Mark Warner is a Democrat from my home state (Va.), and one of the few members of Congress who actually gets tech issues and can see through the all the BS. It really steams me that some conspiratorial social media wingnut can have this kind of sway over a very real duty of Congress.

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/142/726/117/810/354/original/bd4ff7f6868ef3a3.png
  15. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 04-Sep-2025 04:43:06 JST BrianKrebs BrianKrebs
    in reply to

    Some companies that have recently disclosed having data theft as a result of the Salesloft Drift fiasco:

    Cloudflare: https://blog.cloudflare.com/response-to-salesloft-drift-incident/

    Zscaler: https://www.zscaler.com/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response

    Proofpoint: https://www.proofpoint.com/us/blog/corporate-news/salesloft-drift-supply-chain-incident-response

    Rubrik
    https://www.rubrik.com/blog/company/25/salesforce-connected-third-party-drift-application-supply-chain-incident-response

    BeyondTrust: https://www.beyondtrust.com/trust-center/security-advisories/salesforce-salesloft-drift-security-incident

    Spycloud:
    https://spycloud.com/newsroom/salesloft-drift-incident-spycloud-response/

    Tenable: https://www.tenable.com/blog/tenable-response-to-salesforce-and-salesloft-drift-incident

    I'm sure there are and will be a lot more.
    The disclosures are mostly very similar, stating that no sensitive customer data was compromised. It may well be the case that the most valuable thing about the stolen tokens is that -- at least for a time -- some of them probably can be used to move laterally within the target organization.

    In conversation about 10 days ago from infosec.exchange permalink

    Attachments







    1. Domain not in remote thumbnail source whitelist: www.tenable.com
      Blog
      from //tenable.com/humans.txt
      Stay up-to-date on cybersecurity news, security alerts, research, exposure management info, how-to guidance, best practices and thought leadership from Tenable.
  16. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 04-Sep-2025 02:43:21 JST BrianKrebs BrianKrebs

    just wow. read this, from Techdirt:

    Wired, Business Insider Editors Duped By Completely Bogus ‘AI’ Using ‘Journalist’ Who Made Up Towns, People That Don’t Exist

    https://www.techdirt.com/2025/09/02/wired-business-insider-editors-duped-by-completely-bogus-ai-using-journalist-who-made-up-towns-people-that-dont-exist/

    Here's Wired's mea culpa:

    https://www.wired.com/story/how-wired-got-rolled-by-an-ai-freelancer/

    Techdirt's Karl Bode correctly concludes: "This country has taken an absolute hatchet to quality journalism, which in turn has done irreparable harm to any effort to reach reality-based consensus or have an informed electorate. The rushed integration of “AI,” usually by media owners who largely only see it as a way to cut corners and undermine labor, certainly isn’t helping. Add in the twisted financial incentives of an ad-based engagement infotainment economy, and you get exactly the sort of journalistic outcomes academics long predicted."

    In conversation about 10 days ago from infosec.exchange permalink
  17. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 04-Sep-2025 01:38:22 JST BrianKrebs BrianKrebs
    in reply to
    • Rich Felker

    @dalias Okay. But it's not my "post" per se. That's a cut and paste from the first three paragraphs of the story.

    In conversation about 10 days ago from infosec.exchange permalink
  18. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 04-Sep-2025 01:33:55 JST BrianKrebs BrianKrebs

    #resist

    US immigration agents will have access to one of the world’s most sophisticated hacking tools after a decision by the Trump administration to move ahead with a contract with Paragon Solutions, a company founded in Israel which makes spyware that can be used to hack into any mobile phone – including encrypted applications.

    The Department of Homeland Security first entered into a contract with Paragon, now owned by a US firm, in late 2024, under the Biden administration. But the $2m contract was put on hold pending a compliance review to make sure it adhered to an executive order that restricts the US government’s use of spyware, Wired reported at the time.

    That pause has now been lifted, according to public procurement documents, which list US Immigration and Customs Enforcement (Ice) as the contracting agency.

    https://www.theguardian.com/us-news/2025/sep/02/trump-immigration-ice-israeli-spyware

    In conversation about 10 days ago from infosec.exchange permalink
  19. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Wednesday, 03-Sep-2025 10:40:13 JST BrianKrebs BrianKrebs

    The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they'd made with company called DSLRoot, which was paying $250 a month to plug a pair of laptops into the Redditor's high-speed Internet connection in the United States.

    I spent a few days working with another researcher to dig into the history and provenance of DSLRoot, one of the oldest "residential proxy" networks with origins in Russia and Eastern Europe. Its proprietor used to call himself the "USProxyKing" on the forums, and built his proxy business through pay-per-install affiliate programs and by uploading booby-trapped cracked software and movies to the file-sharing networks.

    https://krebsonsecurity.com/2025/08/dslroot-proxies-and-the-threat-of-legal-botnets/

    In conversation about 10 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/095/502/187/558/692/original/40706721aa351de4.png
  20. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Tuesday, 02-Sep-2025 07:47:36 JST BrianKrebs BrianKrebs

    New, from me:

    The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America to convert customer interaction into Salesforce leads, has left many companies racing to invalidate the stolen credentials before hackers can exploit them. Now Google warns the breach goes far beyond access to Salesforce data, noting the hackers responsible also stole valid authentication tokens for hundreds of online services that customers can integrate with Salesloft, including Slack, Google Workspace, Amazon S3, Microsoft Azure, and OpenAI.

    https://krebsonsecurity.com/2025/09/the-ongoing-fallout-from-a-breach-at-ai-chatbot-maker-salesloft/

    Incidentally, there has been some truly awful reporting perpetrated around the periphery of this story that needs to be called out as irresponsible bullshit. Newsweek uncritically reported today the names of Google employees who were being threatened by the threat actors who claim (with little convincing evidence) to be responsible.

    And Trend Micro's blog put out what I can only assume is AI-produced slop drivel because it basically claimed that a few hundred Google Workforce accounts that were exposed in this Salesloft breach suddenly meant billions of Gmail users were at risk. That Trend atrocity was then of course re-perpetrated to produce even more uncritical garbage "reporting" about this incident. I'm not linking to either, just needed to get that off my chest. It's truly remarkable when Google has to put out a statement talking everyone down off the ledge over this. Pro tip: if you don't track these groups for a living and you don't live and breathe this Com crap, you're probably not going to be able to just parachute in here and write a cool tech story that is also accurate.

    In conversation about 12 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/131/304/653/608/983/original/7cf2cf9fd205a6a7.png
  • Before

User actions

    BrianKrebs

    BrianKrebs

    Independent investigative journalist. Covers cybercrime, security, privacy. Author of 'Spam Nation,' a NYT bestseller. Former Washington Post reporter, '95-'09. Signal: briankrebs.07 krebsonsecurity @ gmail .comLinkedin: https://www.linkedin.com/in/bkrebs

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          21764
          Member since
          9 Nov 2022
          Notices
          463
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.