Hey #infosec and various old school #hacker types out there. Ages ago I read a tale about a print server that was the source of an intrusion into some system that the author of this tale was trying to secure. In other words, the print server (at some ISP in Australia) had been popped and from there the attacker was getting into other systems. If you were around in the last century and involved in tech and security you might have read this in some zine or blog. A pointer to a copy of this tale would be appreciated, and you will be rewarded in a large quantity of Zorkmids. And if you get the Zorkmids reference, surely you might recall this tale. Boosts appreciated.
"The bottom line is that when you need to redact text, use black bars covering the whole text. Never use anything else. No pixelization, no blurring, no fuzzing, no swirling. Oh, & be sure to actually edit the text as an image." #InfoSechttps://bishopfox.com/blog/unredacter-tool-never-pixelation
🔎 flawz: A Terminal UI for browsing security vulnerabilities (CVEs) | @orhun
"As default it uses the vulnerability database (NVD) from NIST and provides search and listing functionalities in the terminal with different theming options."
The book includes:
📚 an overview of how the Internet became what it is
🌏 discussions on the legal and geopolitical aspects of #cybersecurity
🛑 a comprehensive overview of the multitudes of threats lurking on the web
An unspecified vulnerability was discovered in an unspecified platform from an unspecified vendor. The vulnerability allowed an attacker to do something.
Yeah, fuck that.
I am never working with Synack / ResponsibleDisclosure.com ever again.
It's been beyond my control, for other reasons, but I'll likely be publishing this tomorrow.
Going through this excellent book by Shaun Pinner, much recommended! There’s many lessons to learn from this book but from my #infosec angle there are a few. Firstly, always keep an off-line maps app on your phone (I use OsmAnd). As a test — switch on airplane mode and try to survive for a day. Can you still navigate from point A to point B? Secondly, keep your social media profiles friends-only access. Thirdly, don’t keep any passwords in memory - it’s a bad practice from security point of view anyway, but I never thought about the interrogation angle. A password manager locked with biometrics and PIN and random passwords everywhere will prevent you from finding yourself in situation where you’ll be begging your interrogators to check another password because you might have remembered wrong.
@organicmaps@notsoloud@kravietz If you could add planning routes ahead of time (from –> to boxes) and a button to save them to a list, that would be handy.
It contains classics like Network Security, 3rd ed from Charlie Kaufman and Radia Perlman
updated 2023 and a great resource on cryptography
and new classics like Cybersecurity Myths and Misconceptions bya @spaf Eugene H. Spafford, Leigh Metcalf and Josiah Dykstra - I have that in print and getting the PDF is really nice! Lovely book!