GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by BrianKrebs (briankrebs@infosec.exchange)

  1. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Tuesday, 24-Mar-2026 06:52:24 JST BrianKrebs BrianKrebs

    Whoa, that escalated quickly. This just got sent out by the press folks at the Federal Communications Commission (FCC). The FCC says it has decided that all foreign-made consumer-grade Internet routers are henceforth prohibited from receiving FCC authorization and are therefore prohibited from being imported for use or sale in the United States.

    "Update Follows Determination by Executive Branch Agencies that Consumer-Grade Routers Produced in Foreign Countries Threaten National Security

    WASHINGTON, March 23, 2026—Today, the Federal Communications Commission updated its Covered List to include all consumer-grade routers produced in foreign countries. Routers are the boxes in every home that connect computers, phones, and smart devices to the internet. This followed a determination by a White House-convened Executive Branch interagency body with appropriate national security expertise that such routers “pose unacceptable risks to the national security of the United States or the safety and security of United States persons.”

    "The Executive Branch determination noted that foreign-produced routers (1) introduce “a supply chain vulnerability that could disrupt the U.S. economy, critical infrastructure, and national defense” and (2) pose “a severe cybersecurity risk that could be leveraged to immediately and severely disrupt U.S. critical infrastructure and directly harm U.S. persons.”

    "This action does not affect any previously-purchased consumer-grade routers. Consumers can continue to use any router they have already lawfully purchased or acquired."

    "Producers of consumer-grade routers that receive Conditional Approval from DoW or DHS can continue to receive FCC equipment authorizations. Interested applicants are encouraged to submit applications to conditional-approvals@fcc.gov."

    Not sure how many consumer-grade routers will be left for sale if it really is a ban on approvals for any foreign-made consumer routers like they said, and not just a bunch of already restricted Chinese makers like Huawei and ZTE.

    https://www.fcc.gov/document/fcc-updates-covered-list-include-foreign-made-consumer-routers

    FCC's "covered list" of "thou shalt not entities": https://www.fcc.gov/supplychain/coveredlist

    In conversation about 7 hours ago from infosec.exchange permalink
  2. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 12-Mar-2026 01:41:57 JST BrianKrebs BrianKrebs

    Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

    A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

    From the story:

    "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

    "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

    https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/

    #stryker #handala #intune #wiper #cybersecurity

    In conversation about 13 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/211/464/307/859/938/original/3d348cfab9495ad4.png
    2. Domain not in remote thumbnail source whitelist: krebsonsecurity.com
      Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
      A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said…
  3. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Wednesday, 11-Mar-2026 09:38:20 JST BrianKrebs BrianKrebs

    New, by me: How AI Assistants are Moving the Security Goalposts

    AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate virtually any task — are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted co-worker and insider threat, ninja hacker and novice code jockey.

    Read more (and boost please!):

    https://krebsonsecurity.com/2026/03/how-ai-assistants-are-moving-the-security-goalposts/

    #openclaw #AI #agentic #aiagents #lethaltrifecta

    In conversation about 13 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/200/212/293/707/219/original/44864d04eae0af69.png
  4. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Wednesday, 11-Mar-2026 09:38:19 JST BrianKrebs BrianKrebs
    in reply to

    So one of the guys I wrote about in this story -- Matt Schlicht, the creator of Moltbook, a bizarre Reddit-like platform for AI agents that Schlicht said he vibe coded with OpenClaw -- has just had his bot social network acquired by Meta (for undisclosed terms).

    Interestingly, Schlicht said he didn't write a single line of code for the project. From the story:

    "AI assistants like OpenClaw have gained a large following because they make it simple for users to “vibe code,” or build fairly complex applications and code projects just by telling it what they want to construct."

    "Less than a week after its creation, Moltbook had more than 1.5 million registered agents that posted more than 100,000 messages to each other. AI agents on the platform soon built their own porn site for robots, and launched a new religion called Crustafarian with a figurehead modeled after a giant lobster. One bot on the forum reportedly found a bug in Moltbook's code and posted it to an AI agent discussion forum, while other agents came up with and implemented a patch to fix the flaw."

    "“I just had a vision for the technical architecture and AI made it a reality,” Schlicht said. “We’re in the golden ages. How can we not give AI a place to hang out.”

    Axios story on acquisition: https://www.axios.com/2026/03/10/meta-facebook-moltbook-agent-social-network

    Good YouTube vid on Moltbook: https://www.youtube.com/watch?v=1Y_u0fY-AbA

    In conversation about 13 days ago from infosec.exchange permalink

    Attachments


    1. OpenClaw is a Security NIGHTMARE.
      from CyberFlow
      Join The Family:💻👩🏻💻https://cyberflow-academy.framer.website/Check Out The Courses We Offer: https://cyberflow-academy.framer.website/coursesEducational...
  5. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Wednesday, 11-Mar-2026 04:49:43 JST BrianKrebs BrianKrebs

    We've been weaning ourselves off ordering things from Amazon, so my wife went and ordered something big from a different retailer, who was actually advertising it at a lower price than Amazon. Well, after a week of waiting for the item to ship, it suddenly just arrived. Turns out the order was fulfilled through Amazon anyway.

    In conversation about 13 days ago from infosec.exchange permalink
  6. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Wednesday, 04-Mar-2026 01:36:20 JST BrianKrebs BrianKrebs

    Saw a few videos this morning of Iranian drones targeting US military bases and blowing shit up. I was struck by how loud and slow these things are. It's as if the loudest leafblower on the planet had wings and a propeller.

    This AP News story has some good detail on Iran's response to its neighbors, which indicates the majority of the many, many missiles and drones Iran sent at or near the UAE were intercepted, but that some less defended places were still hit due to the volume of the missile/drone volley.

    "Officials in Dubai in the United Arab Emirates said Sunday that air defenses had dealt with 165 ballistic missiles, two cruise missiles and more than 540 Iranian drones over two days. While officials said they intercepted all air attacks Saturday, debris from the knocked-down weapons sparked blazes at some of Dubai’s most iconic locations."

    "Some Iranian drones flew as far as a U.K. military base in Cyprus. The runway at the Royal Air Force base in Akrotiri was struck by an Iranian drone Sunday, according to U.K. officials, and sirens blared there again Monday when two more drones heading toward the base were intercepted."

    "State-of-the-art U.S. and Israeli air defense assets have proven efficient in intercepting most of Iran’s ballistic missiles launched at Israel. But the attacks using large numbers of cheap drones hit some softer targets lacking the same level of protection."

    https://apnews.com/article/iran-us-israel-gulf-war-drone-49c8ea76358e579447ff839485f394ac

    In conversation about 21 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: dims.apnews.com
      Iranian drones buzz across the Persian Gulf after their pivotal use by Russia in Ukraine
      from https://apnews.com/author/the-associated-press
      The distinctive buzz of the Iranian-designed drones has become a familiar sound in Ukraine over the past four years.
  7. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Monday, 02-Mar-2026 23:14:19 JST BrianKrebs BrianKrebs

    New, by me: Who Is the Kimwolf Botmaster, "Dort"?

    In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to build Kimwolf, the world’s largest and most disruptive botnet. Since then, the person in control of Kimwolf — who goes by the handle “Dort” — has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks against the researcher and this author, and more recently caused a SWAT team to be sent to the researcher’s home. This post examines what is knowable about Dort based on public information.

    https://krebsonsecurity.com/2026/02/who-is-the-kimwolf-botmaster-dort/

    In conversation about 22 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/159/859/092/244/058/original/a53e5b0c509e0d8a.png
    2. Domain not in remote thumbnail source whitelist: krebsonsecurity.com
      Who is the Kimwolf Botmaster “Dort”?
      In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle…
  8. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 26-Feb-2026 05:45:48 JST BrianKrebs BrianKrebs

    Agentic AI-based services are the new Shadow IT. Change my mind.

    In conversation about a month ago from infosec.exchange permalink
  9. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 26-Feb-2026 05:45:47 JST BrianKrebs BrianKrebs
    in reply to

    I'd argue that very few companies have any real appreciation for how many of their employees are already feeding API keys and other stuff into fairly new and questionable agentic AI tools or platforms. So many companies are like, oh we're taking a wait-and-see approach to adopting AI. Meanwhile, half their dev team is doing critical development work on shared servers that have no authentication or limited (no 2fa) auth.

    In conversation about a month ago from infosec.exchange permalink
  10. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Tuesday, 24-Feb-2026 09:34:56 JST BrianKrebs BrianKrebs
    in reply to

    Meanwhile, for the past week, LinkedIn has been showing me some other company's dashboard in my profile.

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/121/780/275/212/270/original/35444ada5e251467.png
  11. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Tuesday, 24-Feb-2026 06:41:05 JST BrianKrebs BrianKrebs

    Lol, most of these impressions were on a post I made about why you maybe shouldn't verify your LinkedIn account.

    https://infosec.exchange/@briankrebs/116103192779110422

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/121/765/448/702/843/original/6b0533bf2483e729.png
  12. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Monday, 23-Feb-2026 23:46:52 JST BrianKrebs BrianKrebs

    Favorite headline today (via HackerNews): Pope tells priests to use their brains, not AI, to write homilies

    https://www.ewtnnews.com/vatican/pope-leo-xiv-tells-priests-to-use-their-brains-not-ai-to-write-homilies

    In conversation about a month ago from infosec.exchange permalink
  13. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Monday, 23-Feb-2026 22:46:17 JST BrianKrebs BrianKrebs

    Really enjoyed this scoop from the Financial Times, where a team of reporters identified 48 seemingly independent companies working from different physical addresses that appear to be operating together to disguise the origin of Russian oil, particularly from Kremlin-controlled Rosneft. The kicker: The network was discovered because they all share a single private email server.

    From the (paywalled) story:

    "The FT was able to identify 442 web domains whose public registrations show they all use a single private server for their email, “mx.phoenixtrading.ltd”, showing that they share back-office functions."

    "The FT was then able to identify companies by comparing the names in the domain to those of entities that appear in Russian and Indian customs records as involved in carrying Russian oil."

    "For example, Foxton FZCO, a Dubai-based entity listed as the buyer of $5.6bn of oil in Russian export filings, matches “foxton-fzco.com”. Similarly, Advan Alliance, an entity listed in Indian filings as having sold $1.5bn of Russian oil into the country, can be linked to “advanalliance.ltd”. "

    "Filings linked by the FT to the domain list show oil exports from Russia amounting to more than $90bn."

    https://www.ft.com/content/4310f010-2b3c-493e-ba0a-26dc6d156b2e

    In conversation about a month ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: images.ft.com
      Email blunder exposes $90bn Russian oil smuggling ring
      Apparent network of companies using same server includes little-known group that has become country’s largest oil exporter
  14. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Monday, 23-Feb-2026 22:13:41 JST BrianKrebs BrianKrebs

    A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished. Dubbed "Starkiller," the service uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the victim and the legitimate site -- forwarding the victim's username, password and multi-factor authentication code to the legitimate site and returning its responses.

    https://krebsonsecurity.com/2026/02/starkiller-phishing-service-proxies-real-login-pages-mfa/

    #phishing #MFA #starkiller

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/120/098/556/545/551/original/28ac6d674f72912e.png
  15. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Saturday, 21-Feb-2026 23:09:13 JST BrianKrebs BrianKrebs
    in reply to

    The CEO of Persona responded to this post, saying they wanted to clarify about the identity verification process. They said:

    "The only subprocessors (8) used are: AWS, Confluent, DBT, ElasticSearch, GCP, MongoDB, Sigma Computing, and Snowflake

    All biometric personal data is deleted immediately after processing.

    All other personal data processed is automatically deleted within 30 days. Data is retained during this period to help users troubleshoot.

    No personal data processed is used for AI/model training. Data is explicitly used to confirm your identity.

    The subprocessors used do NOT include Anthropic, Groqcloud, or OpenAI. The referenced subprocessor list is the superset of subprocessors used across all customers which is unfortunately misleading - we are updating our documentation to make this clearer going forward (thank you for helping us realize this). Our customers select which products are used which determines which subprocessors are used."

    In conversation about a month ago from infosec.exchange permalink

    Attachments


  16. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Friday, 20-Feb-2026 23:19:53 JST BrianKrebs BrianKrebs

    If you're on LinkedIn and are thinking about verifying your account with them, maybe read this first. It walks through LinkedIn's privacy disclosure to identify 17 companies that may receive and process the data you submit, including name, passport photo, selfie, facial geometry, NFC data chip, national ID #, DoB, email, phone number, address, IP address, device type, MAC address, language, geolocation etc. Unsurprisingly, it seems the biggest recipients are US-based AI companies.

    https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/103/178/327/243/236/original/e6bc02dc19c54552.png
  17. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 19-Feb-2026 03:50:42 JST BrianKrebs BrianKrebs

    Thank god Microsoft is shoving Copilot AI crap into everything. One gets the sense this isn't going to be an isolated occurrence. From Bleeping Computer:

    "Microsoft says a Microsoft 365 Copilot bug has been causing the AI assistant to summarize confidential emails since late January, bypassing data loss prevention (DLP) policies that organizations rely on to protect sensitive information."

    https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/

    In conversation about a month ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
      Microsoft says bug causes Copilot to summarize confidential emails
      from @BleepinComputer
      Microsoft says a Microsoft 365 Copilot bug has been causing the AI assistant to summarize confidential emails since late January, bypassing data loss prevention (DLP) policies that organizations rely on to protect sensitive information.
  18. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 12-Feb-2026 06:11:55 JST BrianKrebs BrianKrebs

    Yes, Windows (ab)users it's your favorite time of the month once again (ducks). Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six "zero-day" vulnerabilities that attackers are already exploiting in the wild.

    https://krebsonsecurity.com/2026/02/patch-tuesday-february-2026-edition/

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/048/686/678/525/034/original/a72d44121d2b8d0e.png
  19. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 12-Feb-2026 05:19:41 JST BrianKrebs BrianKrebs

    Thank goodness the Federal Aviation Administration is still able to do its job and be the adult in the room. For now, anyway. How long until the Cheetoh in Chief starts grounding planes in blue states for the rebuke?

    From CBS News:

    "The unexpected but brief airspace closure in the Texas border city of El Paso stemmed from disagreements between the Federal Aviation Administration and Pentagon officials over drone-related tests, multiple sources close to the matter told CBS News. "

    "The Pentagon had undertaken extensive planning on the use of military technology near Fort Bliss, a military base that abuts the El Paso International Airport, to practice taking down drones."

    "Two sources identified the technology as a high-energy laser."

    "Meetings were scheduled over safety impacts, but Pentagon officials wanted to test the technology sooner, stating that U.S. Code 130i requirements governing the protection of certain facilities from unmanned aircraft had been met."

    "FAA Administrator Bryan Bedford on Tuesday night decided to close the airspace — without alerting White House, Pentagon or Homeland Security officials, sources said."

    https://www.cbsnews.com/news/airspace-closure-followed-spat-over-drone-related-tests-and-party-balloon-shoot-down-sources-say/

    In conversation about a month ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: assets1.cbsnewsstatic.com
      Airspace closure followed spat over drone-related tests and party balloon shoot-down, sources say
      from @@jenniferjjacobs
      Pentagon officials had undertaken planning to use military technology near Fort Bliss, in El Paso, to practice downing drones.
  20. Embed this notice
    BrianKrebs (briankrebs@infosec.exchange)'s status on Thursday, 12-Feb-2026 01:29:37 JST BrianKrebs BrianKrebs

    New, by me: Kimwolf Botnet Swamps Anonymity Network I2P

    For the past week, the massive “Internet of Things” (IoT) botnet known as Kimwolf has been disrupting The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to evade takedown attempts against the botnet’s control servers.

    https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/052/891/179/715/441/original/ba0472717482ffdb.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/052/891/305/288/333/original/ba8c33d8d06fb7ee.png
  • Before

User actions

    BrianKrebs

    BrianKrebs

    Independent investigative journalist. Covers cybercrime, security, privacy. Author of 'Spam Nation,' a NYT bestseller. Former Washington Post reporter, '95-'09. Signal: briankrebs.07 krebsonsecurity @ gmail .comLinkedin: https://www.linkedin.com/in/bkrebs

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          21764
          Member since
          9 Nov 2022
          Notices
          604
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.