Regular reminder that if you do this with your webapps, you're a part of the problem, and any attempts to reason with me on that will be met with laughter and image macros.
you wanna know why infosec is like this? Its because there are no consequences for failure for anyone but you. Sure there is compliance, but nobody ever really goes to jail when a breach happens.
Remember equifax? The only high profile arrest was the exec who got four months in the country club for insider trading.
They're more upset that he had a warning to dump his stock than they were that all of your fucking data got stolen by a company that more or less governs your livelihood.
As you all know, when a new door opens (support for the 7.0.3 rule syntax), that another door must close (support for the 4.0.x syntax), due to limited resources.
As a reminder, the Suricata 4.1.x branch was EOL'd by OISF at the end of 2020, and that the ET team kept supporting rules for it out of community need.
If this is a choice that affects your network security posture, the best advice I can offer you is to focus on transitioning to Suricata 5, Suricata 6, or the latest current 7.x release.
and if I'm really being truthful with you, moving to the current Suricata 7.x release is the best choice you can make right now.
There are detailed guidelines for installing Suricata on the OISF's Suricata "read the docs", there are pre-built packages available for most distributions, and if none of that satisfies you, I can wholeheartedly recommend security onion for your evaluation needs as it comes with Suricata pre-installed, rule downloading/management tools, and an ELK stack pre-installed for rule review.
I'm looking to get a newer, hopefully more energy efficient and/or power server in the basement of my home. Power bills are kinda crazy. Do any of you have any suggestions?
The more cores it comes with, the better.
Same with RAM, I hope to find a platform that supports 64GB of RAM or more.
In an ideal world, I want at least two M.2 slots as well.
I've been looking on and off at various things on amazon and aliexpress, but want to see what you all are using out there.
I like smaller form factor things.
NUC, Barebones mini PC, up to a standard tower PC case would be fine.
got an insta-pot for christmas. Trying out pot roast in this thing today. after reaching temperature, it claims it'll be done in about 35 minutes. Don't know if I believe that, but I guess I'll see.
chalk this up to monkey see monkey do, or gross incompetence, but I never realized that it was recommended that one sears their chuck roast prior to yeeting it into the pot.
My mom would just throw it in raw, and some hours later, it was still fall apart soft.
Has Ivanti been compromised due to this vulnerability? No. Ivanti does use our own tools and technology. Ivanti has no indication that it has been compromised. Ivanti uses enterprise-grade technology and security partners to detect, prevent, and respond to increasingly sophisticated threat actors.
Senior Security Researcher, Proofpoint Emerging Threats.I've been doing this cybersecurity thing for the better part of a decade now. Probably longer than that. I'm starting to forget. Time is relative, but it surely isn't kind to my memory.I'd like to think I do cybersecurity well, but blue teamers collectively get told they're doing it wrong constantly. So maybe I just failed forward throughout my career.Oh, I wrote a book. Its a good framework for setting up a virtual machine lab. See my bookmarked toots if you're curious.Work-Related hashtags:#Iocs #ThreatIntel #DFIR #Malware #NSM #suricata #snort #BEC #phishing #APT #ThreatDetectionHobbies:#VideoGames #XCOM2 #Minecraft #Synthetik #Fallout #Skyrim #Anime #Manga #Adventure #Fantasy #Isekai #HomeImprovement #WoodWorking #MetalWorking #HomeLab