
Peter J. David
521 posts

Peter J. David
@PJDsec
Infused vet, Twitter rookie, loving being a dad with my favorite lady and our daughter.








Video on CRXaminer, the extension ecosystem, high-profile incidents, and challenges associated with building your own security tool: How do you rank findings? How do you communicate context? How do you ensure the tool is useful, and to which audience? youtube.com/watch?v=sH7AB4…

Your browser might be your most overlooked attack surface. Extensions regularly request access to cookies, credentials, and browsing data, but most organizations manage them through fragmented GPOs, MDM tools, or browser-specific consoles. With Browser Extension Control in Falcon Exposure Management, you can: • Create rule groups based on extension IDs or risky permissions • Define allowlist or blacklist platform policies • Automatically block or disable unauthorized extensions Complete demo: crwdstr.ke/6012h4ozu


The Feb. 28 strike on the elementary school was the result of a targeting mistake by the U.S., preliminary inquiry says: “U.S. Central Command created the target coordinates for the strike using outdated data provided by the Defense Intelligence Agency.” nytimes.com/2026/03/11/us/…




























