June 2, 2022
Huge but very confusing news. This raises more questions than it answers. What did they do? When? Where? Who else knew about it? Very very interesting but not very illuminating.
Important note here about US conducting offensive operations (as I’m sure other states supported) occurred only prior to the invasion of Ukraine.
However, this is very significant disclosure. https://t.co/OQ2OB83xNh
Alexander Martin @AlexMartin
@thegrugq @ciaranmartinoxf Of course - there are many but also just builds on what type of support was being offered in that build up. Although it’s also a pattern also seen recently on integration, such as with Lithuania.
(We’ll definitely be discussing this on Friday’s Glasshouse Session: https://www.twitch.tv/theglasshousectr)
-
Not really sure this is wrong.
@matthew_d_green Might as well say “most instant messaging products are a disaster for communications privacy; the exceptions are a handful of emerging privacy-focused instant messaging alternatives, and these are a gift to terrorists”
-
-
Terrible news.
No, DALL-E doesn’t have a secret language.
(or at least, we haven't found one yet)
This viral DALL-E thread has some pretty astounding claims. But maybe the reason they’re so astounding is that, for the most part, they're not true.
Thread 👇🧵 (1/15)
Giannis Daras @giannis_daras
-
Vulnerability
[ZDI-22-806|CVE-2022-23088] FreeBSD 802.11 Network Subsystem Heap-based Buffer Overflow Remote Code Execution Vulnerability (CVSS 8.3)
-
A quick rage-thread about credentials. When security auditors just say things like "Critical credentials need to be rotated every 90 days" you need to fire them into the sun with urgency. Here's what you actually need ...
-
Is this a strategic benefit to controlling games that hasn’t been explored?
ok so for those who arent familiar warthunder is a video game and this is like the fifth time a person with access to classified military information has leaked that information there. to win a video game forum argument
OSINTtechnical @Osinttechnical
-
yesterday my husband tried to explain genes to our son. today he went to school and said, "my dad says there's a 50% chance he's my father" 💀
-
-
In February, the #ContiLeaks was revealed. I wrote an in-depth blog post that shows a methodology for analyzing Conti Jabber logs using Python. Have a look as the code can be applied to multiple data sources. #threatIntelligence #infosec @MsftSecIntel 👇
microsoft.com/security/blog/…
-
Wrote a blog on using the socks module in Mythic to abuse the AD CS vulnerability CVE-2022-26923 to go from a normal user to Domain Admin.
bit.ly/3zbGmcK
Shout-out to @ly4k_ for the research behind the exploit and the awesome certipy tool used to perform the attack.
-
-
This is the BRENT - a phone used in the '90s to hold top secret calls, including by Her Majesty The Queen.
The encryption key ensured secret conversations stayed secret.
The Queen had her own BRENT with encryption key number 1, of course...
@RoyalFamily #PlatinumJubilee #HM70
@RoryCormac I think it's a bit more complicated than that. GCHQ has a secure telephone directory from 1943 (+ or - 1) that lists Buckingham Palace and Windsor Castle a d the Queen spoke of her father's impatience waiting for Secraphone valves to warm up. From then there was always (1/)
More information here
More details about the British secure telephone BRENT, which was eventually manufactured by Finmeccanica subsidiary Selex Communications, can be found in this fact sheet: jproc.ca/crypto/brent2.…
-
-
China's draft cybersecurity rules pose risks for financial firms, lobby group warns reuters.com/world/china/ch…
rules would make it mandatory for investment banks, asset managers, and others to share data w/ CSRC, allow regulator-led testing, set up a centralized data backup center