hi^^

806 posts

hi^^

hi^^

@collysucker

Beigetreten Haziran 2009
72 Folgt217 Follower
hi^^ retweetet
vx-underground
vx-underground@vxunderground·
Jira and Confluence is badass They're going to train off your data unless you opt-out by August, 17th Thank you AI overlords for draining us of literally everything
vx-underground tweet mediavx-underground tweet media
English
45
188
1.5K
109.2K
hi^^
hi^^@collysucker·
Fact: the size of the software stack (lines of code) is enormous. Millions of bugs remain in the IT software stack. Personally, I think the marketing and rumor claims are somewhat exaggerated. Automation and transparency will become more important. (4/4) #glasswing #mythos
English
0
0
0
27
hi^^
hi^^@collysucker·
d. Have extensive logging coverage to understand what and how things might be affected. e. Have strong segmentation, or can rapidly introduce segmentation/isolation. So, if many new vulnerabilities are discovered, fast updates will be important. (3/4)
English
1
0
0
14
hi^^
hi^^@collysucker·
Anthropic Mythos & Glasswing — Thought experiment: If Anthropic’s marketing claims do not materialize, nothing happens in the short term. If Anthropic’s marketing claims are partly, mostly, or fully borne out, you’ll be well positioned if you: (1/4)
English
1
0
0
31
hi^^ retweetet
Mandiant (part of Google Cloud)
🚨 Secure your virtualization layer against threats like BRICKSTORM. Apply our recommendations, and use our vCenter hardening script to automate key security configurations directly at the Photon Linux layer. Get details and the script the script: cloud.google.com/blog/topics/th…
Mandiant (part of Google Cloud) tweet media
English
0
18
35
3.2K
hi^^ retweetet
Tuta
Tuta@TutaPrivacy·
🚨 OPT OUT & say NO to #GitHub using your interaction data to train & improve its AI models. 🚨 GitHub is the next company to choose to opt you into having your data used - by default. 🚩 Opt out in Settings --> Copilot --> Features. Under "Allow GitHub to use my data for AI model training" -→ Disabled. It recently announced that if you do not opt out before April 24th, it will use your interaction data when using #Copilot this includes: - Inputs & outputs - Code snippets - Associated context This applies to Copilot Free, Pro, and Pro+ users.
Tuta tweet mediaTuta tweet mediaTuta tweet mediaTuta tweet media
English
7
37
136
5K
hi^^ retweetet
SpecterOps
SpecterOps@SpecterOps·
Every Entra ID assessment ends here: “How do I get a token without triggering Conditional Access controls?” 🤔 @rbnroot built CAPSlock, an offline ROADrecon-based Conditional Access engine that simulates sign-ins & flags gaps without touching the tenant. ghst.ly/4aKIk64
English
3
89
279
28.8K
hi^^ retweetet
EZ
EZ@IAMERICAbooted·
This is an absolute basic for regulated orgs. I tell people a lot: if you don't want to listen to me, fine. Listen to Mandiant. cloud.google.com/blog/topics/th…
EZ tweet media
English
4
11
89
6K
hi^^ retweetet
Stephan Berger
Stephan Berger@malmoeb·
What I learnt today: Mandatory User Profiles Praetorian named their blog "Persistence Through Forgotten Windows Internals", and true, at least I never heard of Mandatory User Profiles before reading this article. In enterprise environments, administrators sometimes want to enforce a specific user profile that resets on each login. To accomplish this, Windows supports a file called NTUSER[.]MAN (the .MAN standing for “mandatory”), which takes precedence over the usual NTUSER.DAT registry hive stored in %USERPROFILE% when a user logs in. Setting up persistence on a copy of NTUSER.DAT using the Offline Registry Library might evade some EDRs. The whole blog post is worth a read, but the TL;DR for defender is: Consider monitoring for NTUSER[.]MAN file creation in user profile directories, especially when it doesn’t come from an enterprise profile management system. Source: praetorian.com/blog/corruptin…
English
0
22
89
7.3K
hi^^
hi^^@collysucker·
fortiguard.com/psirt/FG-IR-25… FortiGate SSLVPN vuln CVE-2025-68686 (Not) rated highly yet. However, I would promptly patch it (and quickly move away from SSL VPN, regardless of the vendor; instead use IKEv2 EAP-TLS or WireGuard). I think this one might rapidly elevate to a RCE
English
1
0
0
183
hi^^
hi^^@collysucker·
@cyb3rops Love it, great work Flo :-) I built something similar: Based on the info-classification (confidentiality, integrity, availability, business priority) of each application, it gets points. The higher the score the more logs necessary (authN, authZ, change, security, web, etc logs)
English
0
0
5
547
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Just built a demo “monitoring matrix” for a slide in my blind spots talk. Many orgs I’ve worked with have the same idea: “we monitor our systems, visibility is pretty good, only a few systems are not integrated yet.” Then you put it into a simple table and the pattern is always the same: the top-left looks great. Servers and workstations send OS logs, basic auditing is enabled, some alerting exists. It feels like control. But when you go deeper, it gets thin fast. Application logs are missing, not collected centrally, not normalized - and often there isn’t even alerting defined for them. People also rarely agree on what a “critical” application-level alert should be. That needs application owners and security to sit down and define signals. OS-level monitoring is already hard; application-level monitoring is where many programs stop. And when you expand the coverage, it gets harder too. The further you move away from the “standard” systems, the more limits you hit: legacy systems, appliances, OT/embedded, unusual platforms, proprietary log formats, limited access, sometimes legal or organizational limits. Even if you get logs, they are often not easy to ingest and use. Main point: “we have monitoring” is not a checkbox. It’s a spectrum - and many environments are fairly wide, but shallow.
Florian Roth ⚡️ tweet media
English
29
87
596
52.8K
hi^^
hi^^@collysucker·
@techspence Can you share a screenshot, timestamp, hostname, username and the whole error message? Is the problem reproducable?
English
0
0
1
22
spencer
spencer@techspence·
IT help desk lesson number 1: Have you tried turning it off and on again? What’s number 2?
English
205
7
185
24.2K