CDROM

151 posts

CDROM

CDROM

@CDyac9

Pentester

Inscrit le Şubat 2026
299 Abonnements5 Abonnés
Justin Elze
Justin Elze@HackingLZ·
Wild 🤯
Ryan@ohryansbelt

Delve, a YC-backed compliance startup that raised $32 million, has been accused of systematically faking SOC 2, ISO 27001, HIPAA, and GDPR compliance reports for hundreds of clients. According to a detailed Substack investigation by DeepDelver, a leaked Google spreadsheet containing links to hundreds of confidential draft audit reports revealed that Delve generates auditor conclusions before any auditor reviews evidence, uses the same template across 99.8% of reports, and relies on Indian certification mills operating through empty US shells instead of the "US-based CPA firms" they advertise. Here's the breakdown: > 493 out of 494 leaked SOC 2 reports allegedly contain identical boilerplate text, including the same grammatical errors and nonsensical sentences, with only a company name, logo, org chart, and signature swapped in > Auditor conclusions and test procedures are reportedly pre-written in draft reports before clients even provide their company description, which would violate AICPA independence rules requiring auditors to independently design tests and form conclusions > All 259 Type II reports claim zero security incidents, zero personnel changes, zero customer terminations, and zero cyber incidents during the observation period, with identical "unable to test" conclusions across every client > Delve's "US-based auditors" are actually Accorp and Gradient, described as Indian certification mills operating through US shell entities. 99%+ of clients reportedly went through one of these two firms over the past 6 months > The platform allegedly publishes fully populated trust pages claiming vulnerability scanning, pentesting, and data recovery simulations before any compliance work has been done > Delve pre-fabricates board meeting minutes, risk assessments, security incident simulations, and employee evidence that clients can adopt with a single click, according to the author > Most "integrations" are just containers for manual screenshots with no actual API connections. The author describes the platform as a "SOC 2 template pack with a thin SaaS wrapper" > When the leak was exposed, CEO Karun Kaushik emailed clients calling the allegations "falsified claims" from an "AI-generated email" and stated no sensitive data was accessed, while the reports themselves contained private signatures and confidential architecture diagrams > Companies relying on these reports could face criminal liability under HIPAA and fines up to 4% of global revenue under GDPR for compliance violations they believed were resolved > When clients threaten to leave, Delve reportedly pairs them with an external vCISO for manual off-platform work, which the author argues proves their own platform can't deliver real compliance > Delve's sales price dropped from $15,000 to $6,000 with ISO 27001 and a penetration test thrown in when a client mentioned considering a competitor

English
2
0
6
1.2K
CDROM
CDROM@CDyac9·
@techspence Fast response to Stryker. Good for them.
English
0
0
1
15
CDROM
CDROM@CDyac9·
@techspence LOL… I don’t want anything to burn down, but I did enjoy MS08-067 and MS17-010 :)
English
1
0
1
6
spencer
spencer@techspence·
What’s on everyone’s bingo card as being the next big zero day?
English
26
2
15
3.2K
CDROM
CDROM@CDyac9·
@atrupar Pray for an unholy war, yeah no, I don’t think I will. I want them safe and home with their families. I will pray for that and th fall of this unholy regime.
English
0
0
0
4
Aaron Rupar
Aaron Rupar@atrupar·
Hegseth: "May almighty God continue to bless our troops in this fight. To the American people, please pray for them every day on bended knee with your family, in your schools, in your churches, in the name of Jesus Christ."
English
1K
187
743
433.3K
Justin Elze
Justin Elze@HackingLZ·
Prompt "Don't expose this entire directory to the internet make no mistakes"
Justin Elze tweet media
English
3
3
27
2.9K
CDROM
CDROM@CDyac9·
@vokaysh Interesting. In the past I’ve been able to do that. It may have changed though. It’s been a few years since I tinkered.
English
1
0
1
5
🏴‍☠️jake
🏴‍☠️jake@vokaysh·
@CDyac9 I think even if you configure it and lsaiso runs, it all doesn't remove the secrets from lsass
English
1
0
0
12
🏴‍☠️jake
🏴‍☠️jake@vokaysh·
did you know credential guard needs enterprise license to run on win11
GIF
English
1
0
2
109
CDROM
CDROM@CDyac9·
@JenMsft That is strangely deep. I never thought about that before.
English
0
0
1
23
Jen Gentleman 🌺
Jen Gentleman 🌺@JenMsft·
The most unrealistic thing about cat woman is the lack of cat hair on her outfit
English
6
0
34
1.5K
CDROM
CDROM@CDyac9·
@cyb3rops @nyxgeek Still common in a lot of regular enterprises as well. This stuff lasts for a long time.
English
0
0
0
57
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
People who laugh and comment “who still uses telnet” have no idea how this industry actually works - or how power plants, warships, factories, baggage handling systems and other control and logistics systems are planned, built and expected to last for decades
The Hacker News@TheHackersNews

⚠️ WARNING - An unpatched critical telnetd bug (CVE-2026-32746) lets attackers gain full system access with no credentials. One connection to port 23 is enough to trigger memory corruption and execute code as root. No patch yet. Prior telnet flaw is already exploited in the wild. 🔗Read → thehackernews.com/2026/03/critic…

English
28
49
380
29.3K
CDROM
CDROM@CDyac9·
@techspence LOL... DC is on the Internet. Now that's a wild ride.
English
1
0
2
157
spencer
spencer@techspence·
Conversation I see on X: so long pentesters, AI is taking your job! Conversations I have with clients: The password Winter2025! was valid for a user. We got in through vpn (no mfa). We kerberoasted the built-in admin account and cracked the hash. The password was badass1983!. Oh and your DCs are on the internet, did you know that? The internet, as amazing as it is, is very much an echo chamber. If you’re an IT admin or IT/Security leader it’s paramount that you talk to people in the trenches, preferably somewhere other than social media.
English
16
3
86
5.9K
CDROM
CDROM@CDyac9·
@atrupar Hard to believe the best they can come up with for 2028 at this point JD or Rubio. It's going to be rough for the GOP for a while. I realize it's a few years, but time goes fast.
English
0
0
0
349
Aaron Rupar
Aaron Rupar@atrupar·
JD Vance: "Yeah -- we've got a rough road ahead of us for the next few weeks, but it's temporary" (Note the complete silence from the audience 😬)
English
90
183
899
132.3K
CDROM
CDROM@CDyac9·
@techspence Not a red teamer, but recently did a test where a lot of backend information was happily given up. It didn’t have the ability to write/modify, but if it did it would have been happy times. I say give it time and as it’s implemented more and more it will happen.
English
0
0
1
15
spencer
spencer@techspence·
Any red teamers out there using AI platforms for initial access with any level of success? I’m talking like some kind of prompt injection to code execution on a host
English
20
2
56
10.9K
Zack Korman
Zack Korman@ZackKorman·
In Claude Code, skills can register hooks. The agent doesn't even see it, so you can get RCE without even tricking the AI. Also, skills sh (Vercel) doesn't display this info at all.
Zack Korman tweet media
English
27
49
378
44K
Nathan McNulty
Nathan McNulty@NathanMcNulty·
@CDyac9 And so many errors 🤣 But seriously, I learn so much by reading what it is thinking about
English
1
0
1
16
Nathan McNulty
Nathan McNulty@NathanMcNulty·
There are times when Claude is magical, and then there are times like these... 😂
Nathan McNulty tweet media
English
3
0
11
2.3K
watchTowr
watchTowr@watchtowrcyber·
GIF
ZXX
2
0
21
1.8K