ISP vet, password cracker (Team Hashcat), security demi-boffin, YubiKey stan, public-interest technologist, AK license plate […]
🌉 bridged from ⁂ https://infosec.exchange/@tychotithonus, follow @ap.brid.gy to interact
Check your backups, people.
Check your backups, people.
* It works better if it has more samples of what people actually type -- the two edged sword of user benefit and privacy concerns, and
* If you don't check if it's right before you hit send ... _that's on you_.
* It works better if it has more samples of what people actually type -- the two edged sword of user benefit and privacy concerns, and
* If you don't check if it's right before you hit send ... _that's on you_.
After taking care of our small little corner of the Internet for the last 7+ years, I have decided to move on and transition the reigns.
Now the really good news: The great @jerry has graciously agreed to take care of #IOCX going forward.
@jerry , @tellyworth […]
After taking care of our small little corner of the Internet for the last 7+ years, I have decided to move on and transition the reigns.
Now the really good news: The great @jerry has graciously agreed to take care of #IOCX going forward.
@jerry , @tellyworth […]
https://www.darkreading.com/threat-intelligence/data-tool-triage-exploited-vulnerabilities-make-kev-catalog-more-useful
https://www.darkreading.com/threat-intelligence/data-tool-triage-exploited-vulnerabilities-make-kev-catalog-more-useful
This is going to be really useful for #cybersecurity folks. Having this built into the OS opens up so many opportunities and I expect EDR and SIEM vendors will take note. I hope they start publishing their own Sysmon configs to […]
This is going to be really useful for #cybersecurity folks. Having this built into the OS opens up so many opportunities and I expect EDR and SIEM vendors will take note. I hope they start publishing their own Sysmon configs to […]
When I say TOTP is phishable and webauthn (“passkeys”) isn’t, this is a real-world example of what I am talking about
When I say TOTP is phishable and webauthn (“passkeys”) isn’t, this is a real-world example of what I am talking about
We dug through a year of JSON to catch every silent flip and built an RSS feed so you don’t miss the next one.
Read the blog + grab the feed 🗞️ […]
We dug through a year of JSON to catch every silent flip and built an RSS feed so you don’t miss the next one.
Read the blog + grab the feed 🗞️ […]
https://www.nsa.gov/History/Cryptologic-History/Historical-Figures/Historical-Figures-View/Article/1711598/hilda-faust-mathieu/
> Computer network pioneer Hilda Faust Mathieu […]
[Original post on infosec.exchange]
https://www.nsa.gov/History/Cryptologic-History/Historical-Figures/Historical-Figures-View/Article/1711598/hilda-faust-mathieu/
> Computer network pioneer Hilda Faust Mathieu […]
[Original post on infosec.exchange]
`*` for a wide variety of definitions of "worse"
`*` for a wide variety of definitions of "worse"
👎 set -euo pipefail
👍 set -o errexit -o nounset -o pipefail
(Give the person reading your script a fighting chance at being able to search the manual for exactly how the heck the cryptic header incantations are influencing shell behaviour in crucial and subtle […]
👎 set -euo pipefail
👍 set -o errexit -o nounset -o pipefail
(Give the person reading your script a fighting chance at being able to search the manual for exactly how the heck the cryptic header incantations are influencing shell behaviour in crucial and subtle […]
This implies a methodical, structured way of using the napkin -- and of really only needing one side of […]
This implies a methodical, structured way of using the napkin -- and of really only needing one side of […]
_snort_
_snort_
I'm looking to briefly verify quality of a specific title (BBC's Antigone (1986) starring Juliet Stevenson and John Shrapnel, from the "Theban Plays" series)
I'm looking to briefly verify quality of a specific title (BBC's Antigone (1986) starring Juliet Stevenson and John Shrapnel, from the "Theban Plays" series)
https://blog.google/innovation-and-ai/technology/safety-security/google-passkeys-advanced-protection-program/
> Starting today, high risk users can choose a passkey to secure their account in addition to the […]
https://blog.google/innovation-and-ai/technology/safety-security/google-passkeys-advanced-protection-program/
> Starting today, high risk users can choose a passkey to secure their account in addition to the […]