Feb 2, 2023
Wondering how, exactly, your phone is tracked at all times, with locations made available to law enforcement? This video tutorial from a creepy surveillance company is a great explainer:
https://defcon.social/@tprophet/109788222917825915
-
The 5×5—China’s cyber operations - Atlantic Council
https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-chinas-cyber-operations/
-
-
Summary of the paper here
https://hbr.org/2019/12/can-you-know-too-much-about-your-organization
-
The curse of the corporate headshot
Do an image search for the word “business” or “manager”, and what comes back? Nothing that remotely resembles business or managers. It isn’t just that the people are attractive. It is what they are doing. Many stock photos feature well-dressed types sitting around a table. One of them is holding forth and everyone else is laughing madly, like cult members hearing that the Rapture has been brought forward a week.
https://www.economist.com/business/2023/01/26/the-curse-of-the-corporate-headshot
-
-
-
-
-
-
Ronin 2.0.0 release
What is Ronin?
Ronin is a free and Open Source Ruby toolkit for security research and development. Ronin contains many different CLI commands and Ruby libraries for a variety of security tasks, such as encoding/decoding data, filter IPs/hosts/URLs, querying ASNs, querying DNS, HTTP, scanning for web vulnerabilities, spidering websites, install 3rd party repositories of exploitsand/or payloads, run exploits, write new exploits, managing local databases,fuzzing data, and much more.
https://ronin-rb.dev/blog/2023/02/01/ronin-2-0-0-finally-released.html
-
Exposed by an amusing OPSEC fail. Early in the DPRK work day, the threat actor connected directly from a DPRK IP address. OOPSEC.
-