Built some internal views (via Observable Framework) of the social CVE trending mentions (CVE Watch for 🐘 & CVESky for 🦋) that we (GreyNoise) have activity for.
If this ends up not being a candidate for the product, I'll figure out some way to get these published for folks.
Parametrix did some number crunching and estimates the Fortune 500 took a collective $5.4 billion (USD) hit thanks to CrowdStrike’s apocalyptic Falcon update and the combined failures of CS & impacted F500 orgs to design & run actual resilient IT infrastructure.
Now that I've seen what was likely the thing everyone who used Snowflake remotely (API/CLI) was doing, ima go out on a limb and say we're barely at the tip of the iceberg when it comes to the # of orgs who have been breached.
Beyond not mandating MFA, Snowflake actually encouraged folks to store creds in plaintext files (the WARNING thing was from the central one).
This is *not* going to end well unless it gets covered up.
If Crowdstrike's agent is on end-user systems in orgs, this will be a nightmare. It's pretty straightforward to do this to servers in datacenters (provided you've got the right automation). It is still gonna take a while.
Um… Someone shld prbly tell ZDNet that their writers may want to not have ChatGPT write their articles and that their editors might not want ChatGPT to edit their articles to avoid naming the wrong company in the headline and body text and linking to the wrong company's report (and then mix up annual comparisons by using the wrongly named company's previous year’s report).
Um… CVE-2024-29510 (Ghostscript format string vuln that lets RCE escape the sandbox) sounds…bad? Especially since GS is in many automagic document processing pipelines in thousands of orgs (who likely don't know it’s powering their pipelines).
Hey Fortinet users: After Fortinet dunked on D-Link this week, attackers decided to toss a ton of creds at their internet-facing kit. The hack is apparently on. Better forti-fori-fori-forti-secure your kit.
This is *your* opportunity to design systems and networks to bait, trap, and dissect (again, BYOScalpel) our adversaries, plus make the internet a bit safer for everyone.
Hit me up with any q’s!
Apologies, in advance, for you having to work with @Glenn.
Last year, lots of folks were encouraging academic institutions, newsrooms, and other groups to run their own Mastodon instances to help bolster authenticity of the posters.
The Mastodon vulnerability that was patched today is a big reason to NOT run your own Mastodon instance if you cannot keep up with security things.
It was super horrible and I fear many orgs are going to be left vulnerable for a while.
📢 We ( @greynoise ) are *hiring* a Sr. Software Engineer (remote or local in Arlington) to help expand our epic sensor fleet and level-up our persona hosting & management platform.
Hit me up if you have q's abt the job or the GreyNoise team/org.