Tom Van de Wiele
7.3K posts

Tom Van de Wiele
@0xtosh
Offensive R&D Lead • Hacker • Advisor • Speaker Founder Hacker Minded https://t.co/vUexQ0rpvQ | https://t.co/rMzYCRJQn0



Open Source Radar Has Up To 20 KM Range ift.tt/TJQroUL

The most cost effective control to catch attackers are honeypots, here is how. Attacker behavior is predictable: - scan an internal network, go towards lucrative targets - cat ~/.ssh/id_rsa (and other spicy files) - try api keys you’ve found - look for credit cards in Google Drive You can setup fake infra or api keys or gdocs. Whenever anyone interacts with them, you get alerted with indicators of the source of the interaction. It also demoralizes the attackers once they realize it’s a honeypot. AI pentesting is automated large-scale pentests. Attackers will leverage this to attack at wider scales. One of the best controls that scales really well, is honeypots. In a good setup, it is indistinguishable from a real asset, so almost guaranteed to trigger.




We are alarmed by reports that Germany is on the verge of a catastrophic about-face, reversing its longstanding and principled opposition to the EU’s Chat Control proposal which, if passed, could spell the end of the right to privacy in Europe. signal.org/blog/pdfs/germ…


















