ryancheley, to random
@ryancheley@mastodon.social avatar

A question for my security friends out there, is it good practice for an IT team to send out a Phishing email to all users to ‘test’ them? Follow up question, if it IS a good idea, who do you typically use as the sender of the email? Like, the CEO, CFO, a high ranking IT person in the org? Someone else?

tanepiper, to security
@tanepiper@tane.codes avatar

Wanna cyber? We've got a whole bunch of new roles at IKEA
(Based out of Delft or Malmö)

Security Specialist - Cloud - Azure & AWS: https://smrtr.io/jRq3Z

Security Specialist - Endpoint - AV/EDR- MS Defender - https://smrtr.io/jRdK4

Security Engineer - Detection and Incident Response- SIEM - https://smrtr.io/jXdQZ

Security Specialist - Email Expertise - https://smrtr.io/jW-rL

cyberpatch, to Cybersecurity
@cyberpatch@skaverat.net avatar

Available in the shop tomorrow:
Red Team / Blue Team unit patches!

https://cyberpatch.shop

tekkie, to infosec
@tekkie@mstdn.social avatar

Interesting insight into how switched from OpenSSL to BoringSSL and why they did so. https://www.fastly.com/blog/boringssl-to-make-tls-more-secure

eric_capuano, to random

Wrote up a tutorial for using @limacharlieio to push Velociraptor hunt data into BigQuery for analysis... This is next-level hunting at the scale of GCP 🚀

https://docs.limacharlie.io/docs/tutorials-extensions-velociraptor-to-bigquery

0xor0ne, to Cybersecurity
eric_capuano, to random

Somebody recently shared YARA Forge with me and I tested the "core" ruleset and it's maybe the most impressive free ruleset I've seen... Extremely low false positives, very high detection rate.

Another great product from @cyb3rops

eric_capuano, to random

If you're a fan of using Yara for malware detection, you can't go wrong with the "God mode" rule from @cyb3rops

In his words:

It's a PoC aimed at crafting a single rule that covers a vast array of threats with minimal FPs

https://raw.githubusercontent.com/Neo23x0/god-mode-rules/master/godmode.yar

josh, to security

This is a genuine request for input from the community.

A member of upper-middle management for a midsized internet technology company recently explicitly stated that they didn't want to install the company's management agent on their device. "I think for leadership, that sort of thing should be optional" was the quote.

This person is intelligent and capable, and is otherwise someone I would respect as a fellow member of the same circles and business.

This is so against axioms that I hold almost self-evident, that I realized I don't even have good arguments. I can endlessly find corners of the internet where this would be akin to "Pi is exactly 3!" at a Mathematics convention, but is there ever generally a time or company's infrastructure configuration where simply ignoring or allowing to be optional endpoint security wouldn't just be blatantly stupid?

Besides being aghast and expressing sharp chastisement, how does someone go about even beginning to describe why this cavalier attitude is so abhorrent?

Is there some situation where it's actually a kosher methodology or mindset?

I think I might just be so thrown off guard by the concept that I just can't think of even an obvious answer to start with here.

masukomi, to security
@masukomi@connectified.com avatar

geeks. Please help me understand something.

One of my apps runs a tiny local JSON API server. By default this is port 5749, but you can make it whatever, and there is zero need to expose this port to the network.

I have a potential user who says they can't install it because their Co forbids running apps with "open ports". I'm like ⁉️ because I don't understand how this could possibly be a security risk if you don't expose that port.

What am i missing?

AndiMann, to Cybersecurity
@AndiMann@masto.ai avatar

I am excited to keynote at Vision for 2024 tomorrow, Nov 9.

At 12pm ET my talk "The Modern Toolbox: Building Your SecOps RFP" reviews ~100 reqs & explains how to safely 'get to Yes' w/ policy, process, & tools.

Pls join me!!

https://www.techstrongevents.com/secops-2024/home?ref=speakers-twitter&utm_source=twitter&utm_medium=referral&utm_campaign=speakers-twitter

eric_capuano, to infosec

Thrilled to launch So You Want to be a SOC Analyst? 2.0 -- Now, with no requirements to run your own VMs!

SYWTBSA 2.0 enables paid subscribers of my blog to dive into this 6-part threat detection & response lab using a fully self-contained, cloud hosted VM. Also, much of the setup steps have been taken care of for you, enabling you to dive right into the best parts of the lab.

Also, this version of SYWTBSA has been tweaked and revamped specially for this cloud-hosted version.

Check it out here: https://blog.ecapuano.com/p/so-you-want-to-be-a-soc-analyst-20

eric_capuano, to random

New hotness hitting the blog at 8:30am CT / 1:30pm UTC! The next part of my So you want to be a SOC Analyst? series.

Part 6 - Leveraging detection rules to automatically kick off YARA scans against files on disk and processes in memory 🔥

SecureOwl, to infosec

When I’m not shitposting or otherwise broadcasting the never ending firehose of random and often worrying thoughts that pop into my head on a minute by minute basis - I actually write proper professional books!

Here’s one called Security Operations in Practice. It teaches you how to build a SecOps team. I wrote it mostly on a commuter ferry.

You can find it where all books are sold!

0xor0ne, to Cybersecurity

A little trick to spoof PE files sections and embed executable code

https://secret.club/2023/06/05/spoof-pe-sections.html

image/jpeg
image/jpeg

grusp, to devops Italian
@grusp@phpc.social avatar

📌 Inizia la prima edizione di 😍

http://devsecopsday.it/

@edo è carichissimo!

Se ci segui da remoto prepara le domande in chat!

grubbslinger, to security

Hey! I’m looking to add another member to my growing security operations team! If you are looking to help grow security operation processes and work to find evil with an awesome team and a great business, take a look!

https://recruiting.ultipro.com/CEN1011CENBA/JobBoard/51298f34-52ec-478d-bafa-d62ea4ea8c52/OpportunityDetail?opportunityId=85988cd6-66f9-4804-b002-3b00a63abc7a

SecureOwl, to infosec

My book “Security Operations in Practice” covers building and running blue teams, and is also possibly the only book written largely on a boat. You can find it all over, so here is a link to the publisher site: https://shop.bcs.org/store/221/detail/workgroup?id=3-221-9781780175065.

andysandwich, to Cybersecurity

The breach is the gift that keeps on giving..... You gotta love the low iteration count and low length requirements for older long-time users. I hate to pile on any company that has experienced a breach, but If this doesn't deserve a Picard facepalm... I dunno what does. https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/ -

limacharlieio, to Cybersecurity

It has been an incredibly busy month for the team at LimaCharlie. We have released several powerful new features and made many improvements to existing functionality.

> Updates to the EDR Sensor
> New MFA Option - Authenticator App
> Lookup of the Living Off the Land feed from loldrivers
> Announcing LimaCharlie Extensions
> Introducing BinLib: your private binary library
> Added the OpenSearch Output

You can read about the details of these items, and more, in the Developer Roll Up for August 2023: https://limacharlie.io/blog/dev-roll-up-august-2023

0xor0ne, to Cybersecurity
melroy, to security
@melroy@mastodon.melroy.org avatar

When looking at all the CPU vulnerabilities in the recent years even until this day. We see mitigations taking place in microcode or OS level. But the performance impact is huge! Sometimes 30%-50% decrease in performance on specific tasks like databases!
Question: can we get some compensation as consumer? Since both Intel and AMD sold hardware that doesn't give the promised results.

lifeofguenter, to security
@lifeofguenter@convo.casa avatar

CVE-2023-36460

"Fix arbitrary file creation through media processing"

This is honestly quite heavy and can (I do not have full details) potentially be abused for backdoor/intrusion.

Once there, attacker has access to your whole mastodon instance. Even if you run your sidekiq in a different container, most likely you will have the same privileges setup there (database, s3, etc.).

jrdepriest, to transgender

Since there has been a huge influx of new users, I decided to write a new and actually pin it to my profile.
I'm pushing 50 years old and I live in a Red State that is trying to make me illegal. I'm a / woman married to a heterosexual cisgender woman who frequently talks about the current hellscape for people like me in my Toots.
I'm / which is probably why all of these sentences start with "I".
I've worked in for a little over 20 years. I've had lots of roles in , , and . I taught myself , , , and . I'm decent at . I can read and . I enjoy automating things and turning manual processes into scripts.
I've been the primary to my wife for 8 years since she developed a chronic condition and went on disability.
My hobbies including short fiction, journaling my , and playing on my laptop and .
I prefer over over . Still waiting for Amazon to do something, anything with the Stargate property.
While we loved the including and , in general we prefer over .
I'm a fan of / , and , especially the existential dread of or . I tend to sympathize with the nameless terrors. I am not a fan of mindless slashers, unrelenting gore, or torture porn. Over-the-top, egregious gore that crosses into the absurd is fine, though, so I am a Sam Raimi fan, obvs. Also, are underappreciated.
I'm slowly reconnecting with my roots. I knew some stuff about and had a friend who as a tree a lifetime ago and I'm trying to rekindle that.
We've got and they are our kids. I also happen to love , but we don't have any of those.






0xor0ne, to infosec
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • ngwrru68w68
  • Durango
  • mdbf
  • magazineikmin
  • everett
  • thenastyranch
  • rosin
  • Youngstown
  • slotface
  • khanakhh
  • osvaldo12
  • megavids
  • GTA5RPClips
  • tacticalgear
  • cubers
  • modclub
  • tester
  • InstantRegret
  • ethstaker
  • cisconetworking
  • anitta
  • provamag3
  • Leos
  • normalnudes
  • lostlight
  • All magazines