jerry,

What emerging threats are you keeping an eye on? What are you doing about them?

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

deleted_by_author

nlarson830,
@nlarson830@techhub.social avatar

@GossiTheDog @jerry

Keeping my eyes on both of you this is looking like some shenanigans are being planned.

_keith_smith_,
@_keith_smith_@social.keiths-place.com avatar

@jerry Not sure if qualifies as ‘emerging’ but Adobe contract signing spear-phishing attempts have gotten a little too good for comfort lately.

Education.

QuatermassTools,

@jerry him, that dude over there. No, over there. The one with the trilby, flippers and the copy of the avian carrier protocol. Dodgy as fuq if you ask me.

Might have to write a stern letter to The Times!

scotts,

@jerry the ever-increasing demands of cyber insurance, which we're addressing by scrambling to get our shit together

deepthoughts10,

@jerry AITM phishing campaigns that capture/bypass MFA

catbailey,

@jerry The use of LLM user inputs to build a "how do they think"/"how do their minds work" profile database of everyone who throws things into it, all conveniently tagged with their email and phone number, then combining that with deepfakes to create spectacularly realistic mimics of targeted people. Are you SURE that was your contractor on the zoom for the classified project? They weren't on the usual VPN at first and had to be reminded... What if the Dragos attacker hadn't acted like a bull in a china shop, but worked at keeping the illusion...and had video interactions to back it up? How certain ARE you of that "contract to hire" engineer who will vanish a month after getting access to the project they were hired for, and when you eventually find them on social media/IRL the person has no idea what you're talking about because it wasn't actually them? (Note: the solution is NOT "get people physically back in the office".)

If you combine it with movement sensor data from phones or fitbits to, say, imitate somoene's gait/movement style I'd be wondering if there'd be any way to prove you WEREN'T somewhere saying/doing something when even your phone's movement/GPS sensors say you were. Talk about framing someone for basically anything!

Dystopian science fiction nightmare? Yes. Possible with capabilities we have now? Yep. Likely? Well, I can think of several scenarios off the top of my head where it'd be useful STARTING with corporate espionage. How badly does someone want something? (Specifically, how badly does anything military-connected want something? That and porn are the classic starting points for tech advances.)

What am I doing about it? Having nightmares and being ignored and blown off. (And wishing I could find a job helping PREVENT this before people get bit by it, but that requires the part after "having nightmares" to stop happening.)

grubbslinger,

@jerry more risk then threat but how to spread monitoring to lower budget business such as clinics, family practices, small business, non profit. All they have is EDR (if that) and it’s not enough.

fbarton,

@grubbslinger @jerry so much this... and the miscreants know to attack after hours... when nobody is there...

holsta,
@holsta@helvede.net avatar

@jerry I am worried that EU's upcoming NIS2 directive won't properly motivate upper management to implement basic security measures.

gnyman,

@jerry LLM

Yes I know it's over hyped, but looking at the current biggest issues from a $£€ perspective

BEC and whaling

Both are made easier and more effective by LLM's

What am I doing? Trying to come up with ideas on how to make it harder for the bad people.

yonae12,

@jerry SIM porting to bypass MFA. Especially with the t-mobile breach. Raising awareness basically.

jaythvv,

@jerry MFA spamming/fatigue

I am still recovering from the realization this is a thing that actually happens

varx,

@jerry Threat: Supply chain attacks.

Doing about it: Fuck-all.

cyberhoover,

@jerry what worries me: Third-party suppliers of ours adopting AI without any of the appropriate controls in place and without telling us.
what am I doing: lots of vendor due diligence questionnaires and chasing up Legal for what is in our contracts

ragectl,
@ragectl@hachyderm.io avatar

@jerry people trying to install Windows 11. I am avoiding them because that viral malware is nasty 😏

alex_02,

@jerry hardware.

i dont think people will listen so im just going to continue doing my thing and watch shit hit the fan.

dennisfaucher,

@jerry Oh wait. I almost forgot that's why we're here🙂

swansinflight,

@jerry Meta joining fedi. Blocking I'd say.

alex_02,

@swansinflight @jerry ewwwwwwwwwwwwwwwww

secminded,

@jerry

biggest emerging threat; Gen Z

remediation; nod sagely when they respond "ok, boomer"

akmartinez,

@jerry might be old news but this .zip TLD that has been announced is interesting. When I learned of what it was and how it can be abused I was interested in the domains that can be most dangerous... such as statement.zip.

Imagine receiving an email spoofed to be from a bank like https://yourbankd.com@statement.zip letting you know you have a bank statement waiting for you and you click on that link... bad news...

I checked already too... statement.zip is taken and probably already being abused...

Infosecben,
@Infosecben@ioc.exchange avatar

@jerry attacker tooling, supply chain, and API attacks, none particularly new but all seem to be rising in scope and sophistication these days.

Sempf,

@jerry Still the supply chain. npm is the devil incarnate.

steveanderson,

@jerry recreating the basics but in a different set of tools. Why mature when you can save a little bit of money 🤷‍♂️

pearofdoom,

@jerry developer targeted malware.
mapping and understanding our software vendoring and build tooling.

latenightowl,

@jerry Tbh, mostly the continued growth of complexity of everything, not limited to InfoSec.

I'm focused on immutability and reproducibility. It makes your life easier when you know you can tear down and create anything again.

ClevVenger,

@jerry burnout.
Going for walks

  • All
  • Subscribed
  • Moderated
  • Favorites
  • infosec
  • ngwrru68w68
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • anitta
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • provamag3
  • tester
  • Leos
  • megavids
  • JUstTest
  • All magazines