Joshua Smith

2K posts

Joshua Smith banner
Joshua Smith

Joshua Smith

@JoshuaMSmith

CTF-curious, lover of live tech demos and Python Mastodon: [email protected]

Denver, CO Katılım Mayıs 2009
365 Takip Edilen224 Takipçiler
Joshua Smith
Joshua Smith@JoshuaMSmith·
@Jhaddix Well, you didn't say "please" so I think it's a fair response!
English
0
0
1
115
Joshua Smith retweetledi
BleepingComputer
BleepingComputer@BleepinComputer·
Interesting research from @varonis about using malicious firewall rules to delete data in Azure SQL. Microsoft fixed it partially in August and completely in April. varonis.com/blog/malicious…
English
1
29
81
6.7K
Joshua Smith retweetledi
@bsidesboulder@infosec.exchange
@[email protected]@BSidesBoulder·
CFP reviews are now done and speakers have been notified! Expect schedule updates soon on our website, ideally mid-April.
English
0
1
1
57
Joshua Smith retweetledi
vx-underground
vx-underground@vxunderground·
Arkana ransomware group claims to have compromised "Wide Open West - WOW!", one of the largest Internet Service Provider's in the United States. First and foremost: we have never heard of Arkana ransomware group. We've seen some researchers mention them via their onion domain — but this appears to be their first victim. Their first victim is also a giant. Second: previously we shared a music montage video Arkana put together illustrating the level of access they claim to have on "WOW". However, upon inspection, the compromise Arkana is claiming to have is far more devastating than initially thought. Interestingly, Arkana has used some sort of AI tool to provide a high-level overview of their compromise on their onion domain. It reads exactly like a ChatGPT message. tl;dr 1. Arkana opens by threatening WOW by mentioning lawsuits (incorrectly citing GDPR) by shareholders and customners. 2. Arkana mocks the CEO. They published her company shares, address, address history, e-mail addresses, and social security number. They taunt her. 3. Share generic company information which is public, primarily shareholders, company executives, directors, etc. 4. Provide table layouts impacting 403,000 customers including: - UserId - UserName, Password - SecurityQuestion - SecurityAnswer - Email - Full name - WOW service package information 5. Demonstrate full access to "Symphonica" — and show themselves allegedly pushing malware to customer devices (in Michigan?). 6. Demonstrate full access to "AppianCloud", they suggest (in their AI summary, and also in the video they made), they can potentially alter billing information or alter financial transactions (?). 7. The images (as well as the video) Arkana share show intimate and detailed access to WOW. This is very, very, very interesting from a random, suddenly appearing, almost no-name ransomware group. We see ransomware groups appear all the time, rarely do they make an explosive impact like this right out the gate. We personally do not know of many groups capable of NOT ONLY compromising an ISP, but also knowing how to navigate the infrastructure AND ALSO (allegedly, based on the footage provided) push malware to customer devices.
vx-underground tweet mediavx-underground tweet media
English
14
86
586
54.5K
Joshua Smith
Joshua Smith@JoshuaMSmith·
"(Attackers) average just 48 minutes to move through a corporate network after gaining access"
ReliaQuest@ReliaQuest

From the @WSJ: Cybersecurity is no longer optional—it’s a critical investment in today’s rapidly evolving threat landscape. WSJ highlights insights from ReliaQuest showing that attackers are moving faster than ever, taking on average just 48 minutes to move through a corporate network after gaining access. In today’s evolving threat landscape, aligning cybersecurity budgets with business risks is critical—not by spending more, but by spending strategically. At ReliaQuest, we’re committed to equipping organizations with the tools, insights, and strategies they need to confidently navigate these challenges and protect what matters most with efficiency and precision. 🔗 Read the full article: on.wsj.com/4h56Ezo

English
0
0
0
3
Joshua Smith retweetledi
Dave Kennedy
Dave Kennedy@HackingDave·
@dis0wn_ @vxunderground @movShell ❤️ ozempic is amazing - huge breakthrough to help folks out. Whatever it takes to get kick started and help get the results and live healthier / longer ! Can help kick start healthy habits by removing the urge for food.
English
1
1
11
401
Joshua Smith retweetledi
ReliaQuest
ReliaQuest@ReliaQuest·
Our global P3 (Purpose - Plan - Perform) event continues in Dublin, Ireland, bringing together teams from London and Dublin to align on our mission and sharpen our focus on what sets us apart. 🌍 This year we’re leaning in to our unique technology that we’ve built over 15+ years working in security operations at the enterprise. By leveraging data-stitching, detection at source and agentic AI, we empower teams to stay ahead of attackers and protect critical operations. This year, it’s all about seizing opportunities, and we have just scratched the surface of what’s possible. #ReliaQuest #MakeSecurityPossible #Cybersecurity #Teamwork
ReliaQuest tweet mediaReliaQuest tweet mediaReliaQuest tweet mediaReliaQuest tweet media
English
0
1
2
100
Joshua Smith retweetledi
@bsidesboulder@infosec.exchange
@[email protected]@BSidesBoulder·
Wondering what to do this weekend? How about writing an abstract to present at this year's #bsidesboulder event on 13 June. Previous submissions we have accepted have ranged the gamut from lessons learned/war stories in cyber security, trends in the threat landscape, how to
English
3
1
2
74
vx-underground
vx-underground@vxunderground·
Just used my botnet swarm to DDoS 300 elite hackers and scrape all their personal information from the IP address when my IP address was locked
English
41
12
714
37.5K
Joshua Smith retweetledi
Boulder #CitySec
Boulder #CitySec@bouldersec·
As the sayings foretold, we will not disclose the location of this month's BoulderSec or any future one on this platform. The true acolytes of Meepy can still find our updates and announcements by following us on other platforms! Goodbye and fuck Elon✌️
Boulder #CitySec@bouldersec

While the meetup itself is unending, our time on this hellsite will soon be over and we will stop posting updates here next month. Please follow our other social accounts on less egomaniacal platforms: Bluesky: bsky.app/profile/boulde… Masodon: @bouldersec" target="_blank" rel="nofollow noopener">infosec.exchange/@bouldersec

English
1
2
3
154
Tib3rius
Tib3rius@0xTib3rius·
You just know there was a study performed at some point to figure out just how thin they could make toilet paper at airports before people would just give up on life.
English
4
1
17
2.1K
Joshua Smith retweetledi
vx-underground
vx-underground@vxunderground·
We're witnessing the evolution of ransomware. Yesterday someone informed us of the existence of the new TTP of AWS S3 extortion. More specifically, Threat Actors abusing the Amazon Key Management Service (KMS) to encrypt company AWS buckets (or any cloud provider).
English
27
267
1.9K
158.8K