julie, to Cybersecurity

Super weird to me that Dropbox has told Dropbox Sign customers to "delete your existing entry and then reset it" if they use app-based MFA. I have never seen "delete your MFA and create new tokens" in post-compromise account hygiene advice before.

I suspect two things:
1.) Dropbox was storing plain text MFA seeds right next to their password hashes
2.) We're going to hear a lot more about this soon.

ref: https://sign.dropbox.com/blog/a-recent-security-incident-involving-dropbox-sign

leanpub, to tech
@leanpub@mastodon.social avatar

Unlocking the Path to Cybersecurity | How Diverse Backgrounds Lead to Success => Short clip from the Leanpub Frontmatter podcast with Andrew Rathbun, Co-Author of EZ Tools Manuals => The link to the full interview is here => https://youtu.be/5LtX7QwF6WM => This episode was recorded on October 18, 2022 #podcastclips #tech #military #marines #lawenforcement #DFIR

video/mp4

SecurityWriter, to random

Not to be the “what are they teaching kids at school these days” guy. But I have two digital forensics/cyber security post grads on my team, and I had to give them the birds and the bees talk (networking and DNS).

I’m happy to of course, you don’t learn by not asking, but it was a revelation to them.

Both are more ‘qualified’ than me, but had no clue further than what an IP address does.

ktneely,

@SecurityWriter @a y'all are so forgiving. If you can't describe for me in an interview how traceroute works, you're not getting the job. Only for certain jobs, but definitely .

AstraKernel, to rust

🪲 Shellcode evasion using WebAssembly and Rust

👉 Delivering metasploit stager payload using the WebAssembly to evade AV detection

https://balwurk.com/shellcode-evasion-using-webassembly-and-rust/

abrignoni, to infosec

I'd rather just start from scratch...

limacharlieio, to Cybersecurity

Get instant visibility into “right of boom” activities of an ongoing intrusion, plus, quickly gather and process historical evidence for understanding root-cause and all post-compromise activities occurring “left of boom.”

Join @eric_capuano this Wednesday, February 7, 2024 as he discusses the powerful capabilities of SecOps Cloud Platform for fast and scalable incident response & digital forensics.

Register now: https://limacharlie.wistia.com/live/events/t36z7xpnvu

r1cksec, to infosec
abrignoni, to infosec

There will be a meeting at 9 am to discuss the report that no one has read yet even though it was provided a month+ ago.

limacharlieio, to Cybersecurity

Do you need to accelerate your incident response but lack the tools and infrastructure?

On Wednesday, February 7th at 10:00am PT/1:00pm ET, @eric_capuano will demonstrate the SecOps Cloud Platform and showcase its powerful capabilities designed for the DFIR community. This is a game-changer for DFIR teams looking to:

> Get instant visibility into ongoing attacks
> Quickly gather and process forensic artifacts
> Understand the full scope of a breach from initial intrusion to post-compromise activities

Register now: https://limacharlie.wistia.com/live/events/t36z7xpnvu

infosystir, to random

Walk through a customer incident with me!

What happens when attackers can SEO their fake application to the first page of search results, alerts fire along the way, and you have a customer and secops team that are top notch!

https://www.blumira.com/masked-application-attack-incident-report/

abrignoni, to random

Update for iLEAPP:
🛎️ iOS 17 notifications in SEGB v2 format are now supported.
🔗 Get iLEAPP here: https://github.com/abrignoni/iLEAPP

eric_capuano, to random

Wrote up a tutorial for using @limacharlieio to push Velociraptor hunt data into BigQuery for analysis... This is next-level hunting at the scale of GCP 🚀

https://docs.limacharlie.io/docs/tutorials-extensions-velociraptor-to-bigquery

gleeda, to random

I’m looking to hire a Principal Threat Intelligence Analyst here at @huntress . You’ll get to build a new program focused on the small business space (those that fall below the cybersecurity poverty line). Please feel free to reach out to me if you have questions or think you might be a good fit:

https://boards.greenhouse.io/huntress/jobs/5856974003

SecureOwl, to infosec

The Infosec Diaries: A collection of short stories, each episode in each series is based on a real-life story from the field.

Available on Kindle, Paperback and Audiobook

https://www.infosecdiaries.com

volexity, to random

@volexity provides an update on its Ivanti Connect Secure VPN report concerning chained exploitation of CVE-2024-21887/CVE-2023-46805. Based on new data, 1700+ devices have been compromised following widespread exploitation. More details here: https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/

mttaggart, to random

The Magnet Forensics CTF registration is open! March 6, 2024.
magnetvirtualsummit.com/capture-the-flag/

abrignoni, to infosec
volexity, to random

.@volexity recently detected an incident where it discovered a threat actor chained two vulnerabilities in Ivanti Connect Secure, CVE-2023-46805 & CVE-2024-21887, to achieve RCE, modifying components of the software to backdoor the device. Read more here: https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn

hal_pomeranz, to linux

My first public training of 2024 will be Linux Forensics at Black Hat Asia, Apr 16-19 https://www.blackhat.com/asia-24/training/schedule/#linux-forensics-virtual-35826

This is a fully virtual class and I won't actually be in Singapore. I'll be flipping my day/night cycle and teaching from East Coast USA. This could get interesting in many different ways.

chrissanders88, to random

Investigation Scenario 🔎

You discover an unusual scheduled task named "UpdateCheck" on a Windows system. The task triggers a PowerShell script located at "C:\Windows\Temp\update[.]ps1

What do you look for to investigate whether an incident occurred?

You don't have immediate file system access (you can't grab the file quickly), but assume you have access to whatever other digital evidence source you need (system logs, network data, and so on).

gleeda, to infosec

As a manager you should be open to constructive criticism just as you expect ICs to be. Expecting to only broadcast your criticisms while remaining beyond reproach is setting everyone including yourself up for failure. Take the time to listen.

SecureOwl, to infosec

🔒 Delve into the gripping tales of true cybersecurity challenges in the InfoSec Diaries – where real-world incidents, investigations, and penetrating test discoveries come to life.

📘 Discover these compelling stories, now available in Paperback, Kindle, and Audiobook formats.

Uncover the truth behind cybersecurity with the InfoSec Diaries: https://www.infosecdiaries.com/

christammiller, to Ethics

I have a new article out! In it, I describe some of the behind miscarriages of related to :
https://aninjusticemag.com/why-do-good-justice-professionals-do-bad-or-at-least-questionable-things-5f055a44fce7

christammiller,

Because more than half of my professional life has focused on digital forensic evidence, I was struck to see that out of all these examinations, given the rise of digital media during the last three decades, digital evidence accounted for only 16 of the examinations leading to exoneration.

bane, to Cybersecurity
@bane@exploit.social avatar

Looking for contract work or leads. I finished setting up my company, so any potential work will be appreciated.

I can start as soon as possible.

https://secureorigin.io

netonightmare, to books
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • InstantRegret
  • magazineikmin
  • cubers
  • everett
  • rosin
  • Youngstown
  • tester
  • GTA5RPClips
  • slotface
  • khanakhh
  • Durango
  • kavyap
  • DreamBathrooms
  • normalnudes
  • ethstaker
  • ngwrru68w68
  • cisconetworking
  • thenastyranch
  • provamag3
  • osvaldo12
  • Leos
  • mdbf
  • tacticalgear
  • modclub
  • megavids
  • anitta
  • lostlight
  • All magazines