Still have no idea how to get followers on #mastodon. Teach me your ways! Follow me if you like #retrogaming, #80s / #90s#nostalgia, #tech / #cyber related stuff, and #dog pics! Keep me away from Twitter, I beg of you.
🚨 BREAKING: One of the largest data breaches to date dubbed the “Mother of All Breaches,” with 26 billion leaked records — including popular sites like LinkedIn, Snapchat, Venmo, Adobe and X, formerly Twitter — in what is called the biggest leak in history.
The compromised data includes more than just login credentials while much of it is allegedly “sensitive”.
Unauthorized access to accounts and identity theft are very much a possibility: it is time to change passwords (accross platforms if there is password reuse), review/enable MFA and keep your guard up for more elaborate social engineering schemes involving personal details.
I heard recently that an Australian #cyber recruiter was asking people about their childhood experiences - pulling apart computers etc - as part of a formal interview.
If you're still doing this, you're hiring for middle class and wealthy people, who were assigned male at birth, whose parents were tinkerers or wealthy, and you're skewing for neuro diversity.
There's nothing wrong with people who fit that bill. But you're angling very narrowly there.
Be mindful:
girls, and assigned female at birth people, are not encouraged to play with electronics, if they even have access to them
especially if neuro typical, girls (at least until the late 90s) will have gotten the message that it's not right - so unless they're very, very keen on tech, or very, very unconcerned about how they're perceived, they may have avoided playing with electronics even if they wanted to
poor kids don't often have access to electronics
poor parents, or those who grew up poor, tend to punish or scold children who break things, so the kids don't tend to do that if they can help themselves
you need people who grew up interested in other things too. Like how people work, and aesthetics, and logistics and all sorts of things.
Please, please, please stop pursuing only one kind of person.
Wow. Start a friendly VoIP call with a target, record the audio, find patterns in their CPU activity (exploiting the fact the CPU's electro-magnetic fields are captured by the target's built-in PC microphone and can be distilled from the acoustic audio source), match the patterns against pre-trained classifier and deduce some of the target's web activity, cryptographic secrets, position within a video game. It is mind-boggling. #cyber#security#research#machinelearning https://faculty.cc.gatech.edu/~genkin/papers/lendear.pdf
Ein paar Beobachtungen zu den #cyber Konflikten um #Israel / #Gaza sowie #Ukraine / #Russland. Über Hacktivismus früher und heute, die Rolle von Cyber Ops in bewaffneten Konflikten und die Frage nach den staatlichen Bedrohungsakteuren
Microsoft’s threat intelligence team revealed that Iranian cyberspies, identified as Peach Sandstrom, are targeting defense industrial base organizations with a new backdoor named FalseFont. This malware grants remote access to compromised systems, enables the execution of additional files, and facilitates data transmission to its command-and-control servers. The backdoor was initially detected in use against targets in early November 2023.
Mandiant, tracking the Iran-backed group as APT33, highlights their strategic cyberespionage focus on organizations in the US, Saudi Arabia, and South Korea. Their targets include commercial and military aviation companies, as well as energy sector entities linked to petrochemical production.
According to Mandiant’s alert updated in October, APT33’s activities involve malware tied to an Iranian individual, potentially working for the Iranian government to conduct cyber threats against adversaries.
Earlier research by Microsoft revealed APT33 engaging in password spraying attacks across thousands of organizations. Following successful breaches, Peach Sandstorm employed a mix of publicly available and custom tools to navigate networks, establish persistence, and move laterally within the victim’s IT systems.
Microsoft noted instances where Peach Sandstorm exfiltrated data from compromised environments, although this occurred in a limited number of intrusions.
Finally got around to drawing Dan from "Drugs and Wires", an awesome web comic by @cryodraws and Io Black. (Go read it at https://drugsandwires.fail/ !!!)
Just a quick drawing I did yesterday and decided it needed moar cyber, so I edited it a bit in GIMP.
The Ukrainian Blackjack hacker group launched a cyber attack against Rosvodokanal, a Russian water utility company, Ukrainska Pravda reported on Dec. 20, citing undisclosed law enforcement sources.
Media: Ukrainian hackers hit Russian utility company (kyivindependent.com)
The Ukrainian Blackjack hacker group launched a cyber attack against Rosvodokanal, a Russian water utility company, Ukrainska Pravda reported on Dec. 20, citing undisclosed law enforcement sources.