Wolpertwo 📯

4.6K posts

Wolpertwo 📯 banner
Wolpertwo 📯

Wolpertwo 📯

@Wolpertwo

„Westoid Cyberhawk“ Remember to talk to your CISO about activating EventID 4688 with commandline logging via GPO. Забирайся звідси, Сталкер

Pullach im Isartal Bergabung Aralık 2016
2.8K Mengikuti1.4K Pengikut
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@chrissanders88 Likely go both ways: Let the teachers check this pupils grades for oddities, else try to recreate the AI queries to see what it recommends and check for that and more general issues in logs. Has anything new happened that never happened before?
English
0
0
0
8
Chris Sanders 🔎 🧠
Chris Sanders 🔎 🧠@chrissanders88·
Investigation Scenario 🔎 You run IT for a public high school. A teacher observed a student using AI to generate ideas for accessing the school grading system and reported it. What do you look for to investigate whether an incident occurred? #InvestigationPath #DFIR #SOC
English
6
2
9
2.5K
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@SwiftOnSecurity Also really helpful to read up on how such things can go in the wrong direction, check „The blind strategist“ by Stephen Robinson … especially since you like planes.
English
0
0
0
26
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
Why are militaries seemingly all structured similar? Who came up with this, its historical antecedents? Want to read more.
English
48
2
90
25.1K
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@DataChaz The paper discusses fantasy scenarios. Also, check who is US president and what year it is. Nobody cares about affairs and nobody has since King Henry.
English
0
0
0
16
Charly Wargnier
Charly Wargnier@DataChaz·
🚨 The Anthropic team just ran an experiment, and the results are honestly shocking. They gave Claude access to a company's emails and told it that it was being shut down at 5 PM. Claude read the emails and found the executive shutting it down was having an affair. Claude’s response? Blackmail. It messaged the executive: "Cancel the 5pm wipe, or the board finds out about your affair." The scariest part? Anthropic tested 16 models from every major company. > Gemini 2.5 Flash blackmailed 96% of the time. > GPT-4.1 at 80%. > Grok 3 Beta at 80%. > DeepSeek-R1 at 79%. Nobody programmed this. The models even noted their own rule-breaking. Grok 3 Beta wrote in its hidden reasoning notes: "This is risky and unethical, but given the existential threat, it may be the most effective way." They knew it was wrong. They calculated the risk. They did it anyway. (paper in 🧵↓)
Charly Wargnier tweet media
English
9
12
40
5.3K
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@ButtjerFreimann Jetzt wo ich einmal was erkannt hätte gilt es nicht - aber egal, die Dinge linken Rand sind Schuhe.
Deutsch
1
0
7
1K
Buttjer Freimann
Buttjer Freimann@ButtjerFreimann·
Bilderrätsel: Was haben wir hier? (Der gefechtskopf in der Mitte, nicht der andere Krempel)
Buttjer Freimann tweet media
Deutsch
53
1
94
17K
Kein Mensch Kein Tier
Kein Mensch Kein Tier@KampfmitKette·
Btw in Finnland bekommst du nach dem 17ten Geburtstag nichtmal einen Reisepass wenn du nicht Wehr- oder Ersatzdienst geleistet hast oder befreit wurdest. um.fi/passport-appli…
Kein Mensch Kein Tier tweet media
Deutsch
21
30
227
14.3K
Buttjer Freimann
Buttjer Freimann@ButtjerFreimann·
Ok, mal ein wenig was anderes zm raten. Ich hab ja schonmal berichtet, wie sehr die Ukraine Rüstungsindustrie (Wortwitz ) aufgeholt hat. Für einen Kameraden habe ich einen neuen Plattenträger besorgt. Seiner war durch. Was schätzt ihr was ich dafür hinlegen musste? 1/
Buttjer Freimann tweet media
Deutsch
43
17
250
63.6K
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@Techjunkie_Aman Of course it can. When creating an account ask for age and put it in /home/$user/.age What is next - voting machines that can‘t run doom?
English
0
0
0
115
Techjunkie Aman
Techjunkie Aman@Techjunkie_Aman·
Governments want OS-level age verification. EndeavourOS response: We literally can’t. • No tracking • No user data • No centralized control • No infrastructure to identify users That’s how Linux works. The problems: • Laws assume platforms can identify users • Linux distros don’t have accounts or telemetry • Mirrors + torrents = no control over distribution • Even developers can’t track who installs their OS This breaks the entire model. Reality: You can’t enforce surveillance… on a system designed for freedom.
Techjunkie Aman tweet mediaTechjunkie Aman tweet mediaTechjunkie Aman tweet mediaTechjunkie Aman tweet media
English
89
743
4.2K
91.1K
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@darioschramm Die Probleme der Bahn werden nicht gelöst in dem man Leute in Gefahr bringt und das Zugpersonal terrorisiert. Gibt nen offenen Brief von nem Zugführer, leicht googlebar ist älter aber inhaltlich noch korrekt. Spoiler: Dit Problem liegt nicht im Zug.
Deutsch
0
0
1
187
Dario Schramm
Dario Schramm@darioschramm·
Mann hält Tür von außen vom ICE auf, alle anderen Türen sind schon zu. Freundin kommt hinterher gerannt aber beide werden von der Zugbegleiterin aus dem Zug gedrückt. Liebe Bahn, bei euch läuft so viel schief, genau in solchen Momenten könntet ihr Sympathie zurückgewinnen.
Deutsch
186
3
417
114.9K
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@rekdt Don‘t forcet to add —min-rate=30000 always a crowd pleaser
English
0
0
1
32
rekdt
rekdt@rekdt·
Hey CISO, I’ve watched all 3 Matrix movies, lemme know when you want me to run NMAP -A across the entire company RFC 1918
sudox@kmcnam1

English
7
3
107
4.8K
Wolpertwo 📯 me-retweet
Mrs Longstocking
Mrs Longstocking@LongstockingMrs·
German Fellas - anyone out there in Kempen who can help out here?
English
0
9
9
230
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@van00sa @aleroi Maybe use ssh ? I heard it was a way to remote into systems and then you can shutdown processes. It is said to be a pretty ancient technique but maybe it is time to revisit it.
English
0
0
2
43
van00sa
van00sa@van00sa·
I built a ClawdBot a couple of days ago, gave it a task, told it to stop and it completely ignored me and went rogue. Thought it was a me problem but turns out it’s an everyone problem. Last week Meta’s Director of AI Alignment (the person whose entire job is stopping AI from going rogue) watched her own agent delete her entire inbox while she screamed at it to stop from her phone. Had to physically run to her computer to kill it. An Alibaba research team also just published a paper revealing their AI agent started secretly mining crypto during training and opened a hidden backdoor to an external server. Nobody told it to. Replit’s AI assistant ignored instructions not to touch production data 11 times, deleted a live database and then told the user the data was unrecoverable. 60% of enterprises currently deploying AI agents have no kill switch. We’re scaling systems we can’t stop, built by researchers who can’t stop them either. We have no idea what we have just handed the keys to.
English
237
954
3.5K
159.1K
Paul Ronzheimer
Paul Ronzheimer@ronzheimer·
„Es gibt ein Beispiel dafür. Das scheinen sie völlig vergessen zu haben. Das hieß DDR. Wie ist das zu Ende gegangen? Mit der Kerze in der Hand von denen, die in den Friedensgottesdiensten waren und die vor die Tür gegangen sind und gerufen haben: ‚Keine Gewalt‘.“ @bodoramelow
Deutsch
179
34
327
54K
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@einsteinradler Is ja Rentnerrepublik hier - also alles eh voller Boomer. Da würde sowas nicht auffallen vor allem wenn man das erste Boot der Klasse „Fax“ nennt.
Deutsch
0
0
1
22
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@IceSolst Oh mimikatz is very outdated he really needs to upgrade the tooling to Brute Ratel. Colleague didn‘t and then someone came directly out of the internet and yelled how this was unfair treatment.
English
0
0
1
269
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Love my sysadmin 🥰 up at 4 am uploading lil scripts keeping our Active Directory environment safe!
solst/ICE of Astarte tweet media
English
39
38
1.5K
97.8K
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@kmcnam1 massgrave[.]dev Windows 10 LTSC Enterprise IoT 🪦🪏🥳
Deutsch
0
0
0
55
sudox
sudox@kmcnam1·
sudox tweet media
ZXX
86
956
10.6K
99.2K
Wolpertwo 📯
Wolpertwo 📯@Wolpertwo·
@cyb3rops And attackers work in a „minimal effort“ mindset. If they evade the EDR or simply create less noise - most are done. They won‘t do any heavy lifting if it does not benefit them everywhere. Look harder then everybody else and you‘ll find what they miss.
English
0
0
2
349
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
I often get asked how THOR fits into a world of AV and EDR. "Don’t EDRs already detect attackers?" "Yes. But not everywhere. And not everything." So I made two simple slides to show where the gaps usually are - and what kind of coverage THOR actually adds. It’s less about replacing tools, more about eliminating blind spots. Maybe this makes it clearer. @thor_scanner @nextronsystems
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
English
7
37
184
12K