akaBeakman
akabeakman.bsky.social
akaBeakman
@akabeakman.bsky.social
Information security & IT operations professional, automobile & watch enthusiast, amateur movie critic, occasional traveler, thinker & chief detail officer-in-training
Reposted by akaBeakman
New by me: @brysonbort.bsky.social, @malwarejake.bsky.social, Nathan Case, and I wrote up a short paper on protecting your organization from Iranian threat actors in cyberspace. Some simple bullets to focus in your attention on most probable vectors.

www.tarah.org/2025/08/13/p...
Proactive Defense: Iranian Cyber Threats and How to Push Back – Tarah Wheeler
www.tarah.org
August 13, 2025 at 8:22 PM
“Suppose a man can convince me of error and bring home to me that I am mistaken in thought or act; I shall be glad to alter, for the truth is what I pursue, and no one was ever injured by the truth, whereas he is injured who continues in his own self-deception and ignorance.”

—Marcus Aurelius
April 26, 2025 at 4:58 AM
We’ve all been doing more with less for a long time now. Maybe we should try doing more with more.
March 27, 2025 at 5:50 PM
Reposted by akaBeakman
It's never a bad time to take a look at your online accounts and see if you spot a weird device or login.

We have a comprehensive guide on how to check if your Gmail, Apple ID, Facebook, IG, WhatsApp, Telegram, Discord, etc have been hacked.

techcrunch.com/2025/03/25/h...
How to tell if your online accounts have been hacked | TechCrunch
This is a guide on how to check whether someone compromised your online accounts.
techcrunch.com
March 25, 2025 at 9:25 PM
Reposted by akaBeakman
There is zero question in my mind this was initially deployed in an attempt to circumvent established network security controls.

In cybersecurity, we have a term for when an authorized user knowingly tries to evade security controls. It's "insider threat."
Hi, I'm the guy who used to oversee the federal government's agency IT telecommunications contracts. This is extremely bad. There is absolutely no need for this. Not only is it a huge security exposure, but the simplest explanation for this is that it is meant to be a security exposure.
Elon Musk’s Starlink Expands Across White House Complex
Trump administration officials said the company donated the internet service, saying the gift had been vetted by the lawyer overseeing ethics issues in the White House Counsel’s Office.
www.nytimes.com
March 18, 2025 at 12:15 PM
Reposted by akaBeakman
No amount of complicity is going to save you from fascism, so you might as well fight.
March 13, 2025 at 11:51 PM
You can call me Shane.

Feel free to reach out if you’re considering or have begun a career in #infosec or #IT and you’re looking for career guidance or a #mentor.
March 1, 2025 at 4:40 AM
The first post is profound.
March 1, 2025 at 4:14 AM