Robert A.

23.2K posts

Robert A.

Robert A.

@robertauger

25 years Appsec,PurpleTeam,Web Application Security Consortium(WASC) cofounder,Baythreat Organizer,Ex-PayPal/eBay/Box/Workday/Coinbase infosec. https://t.co/TyG8aOV8on

USA Katılım Mart 2009
764 Takip Edilen1.4K Takipçiler
Sabitlenmiş Tweet
Robert A.
Robert A.@robertauger·
Announcement for my new side project! ------------------------------------------------------- SecTemplates.com - Release #1: Security incident response program pack 1.0 Introduction I've worked in the security industry for over 20 years and, during this time, have built and shaped many security programs. At every company I join, I find myself recreating or developing security programs from scratch. My peers have been in a similar position, and the more people I speak with at smaller companies, the more obvious it becomes that there isn't a single location where people can download ready-to-go security programs entirely for free. There's a lot of content online, but it can be difficult to find and challenging to find something simple to start with. I created SecTemplates as a side project to provide baseline programs for smaller security teams without direct expertise in building such programs. Security incident response release pack 1.0 I'm pleased to announce our first release, the Incident Response Program Pack. The goal of this release is to provide you with everything you need to establish a functioning security incident response program at your company. In this pack, we cover Definitions: This document introduces sample terminology and roles during an incident, the various stakeholders who may need to be involved in supporting an incident, and sample incident severity rankings. Preparation Checklist: This checklist provides every step required to research, pilot, test, and roll out a functioning incident response program. Runbook: This runbook outlines the process a security team can use to ensure the right steps are followed during an incident, in a consistent manner. Process workflow: We provide a diagram outlining the steps to follow during an incident. Document Templates: Usable templates for tracking an incident and performing postmortems after one has concluded. Metrics: Starting metrics to measure an incident response program. Announcement: sectemplates.com/2024/06/announ… Download on GitHub: github.com/securitytempla… About SecTemplates To provide simplified, free, and usable open-source templates to enable engineering and smaller security teams to bootstrap security capabilities in their organizations. Upcoming releases - Penetration testing release pack 1.0 Our penetration testing release pack will contain everything you need to scope your first pentest, work with a vendor, execute, and get the types of reports you need from an external tester.
English
1
2
27
2.8K
Robert A.
Robert A.@robertauger·
@IceSolst The thing is, using tokens to determine exploitability/traceability is probably a higher cost than just fixing it.
English
0
0
1
8
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Patching every vulnerability is what every security engineer would love to do, but it’s so detached from reality to just recommend it. How do you prioritize? Who is pushing the fixes? How dos this scale? Ofc their answer to that is: just use more Claude tokens
English
3
2
28
462
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Still thinking about the Anthropic recs where step #1 is the equivalent of: “If you’re homeless, just BUY a HOUSE????” Honestly, “patch every exploitable vuln immediately” is like toddler level strategic thinking. Let them eat cake. Baby’s first seceng job.
solst/ICE of Astarte tweet media
English
8
5
50
1K
Robert A.
Robert A.@robertauger·
@sec_hub93028 Don’t be a jerk, the industry is much smaller than you think….
English
1
0
2
108
SecInterviewHub
SecInterviewHub@sec_hub93028·
What’s your underrated cybersecurity tip?
English
3
0
4
214
Robert A. retweetledi
SecInterviewHub
SecInterviewHub@sec_hub93028·
It seems like cybersecurity conferences tend to preach to the choir. Having security folks speak at developer conferences could have a much bigger impact if executed well. What do you think?
English
3
1
12
870
Robert A. retweetledi
Nathan Calvin
Nathan Calvin@_NathanCalvin·
The CEO of Krafton (creator of PUBG) asked ChatGPT to create a "corporate takeover strategy" to prevent a company they acquired from hitting a revenue target within a certain time window (which would trigger an additional payout). ChatGPT (against his lawyer's advice) suggested locking down the acquired companies Steam account to prevent them from publishing Subnautica 2 in the time window, which the CEO of Krafton followed. ChatGPT's advice did not hold up at trial and the judge was not happy. The opinion is a wild read and includes several direct quotes from the Krafton CEO's ChatGPT conversation. I feel like it's gonna take a few more high profile examples like this until executives start realizing that conversations with ChatGPT are not privileged and you probably shouldn't describe your questionably legal schemes to them in detail!
Nathan Calvin tweet media
English
99
1.7K
15.7K
944.7K
Robert A. retweetledi
Jim Manico from Manicode Security
When using MCP, how do you know which OAuth scope to use? Where in the MCP flow is this even done? The MCP client is responsible for authorization server discovery, scope selection, and use of the OAuth resource parameter to bind the token to the intended MCP server. So it happens at the MCP client level.
English
0
1
2
281
Robert A. retweetledi
SecInterviewHub
SecInterviewHub@sec_hub93028·
One tip while interviewing is to write down the questions you were asked after every interview. Then reflect: How did you answer the question? Did you struggle with it? Was the interviewer impressed? Where were your gaps? After doing this for a couple of interviews, you will have page(s) of questions that you can work on and see where you stand.
English
0
1
3
188
cinesthetic.
cinesthetic.@TheCinesthetic·
PULP FICTION as a video game from the 1990s. This is incredible.
English
67
747
4.7K
429.2K
Robert A. retweetledi
Tips Excel
Tips Excel@gudanglifehack·
Delete 99.8% of your digital footprint from the internet. Here is a step-by-step guide:
English
62
1.4K
12.8K
1.8M
Robert A. retweetledi
Watcher.Guru
Watcher.Guru@WatcherGuru·
JUST IN: Suspect arrested for attacking Sam Altman's home said he wanted to kill the OpenAI CEO and stop humanity's extinction from AI, CNBC reports.
Watcher.Guru tweet mediaWatcher.Guru tweet media
English
867
1.3K
14.7K
1.1M
Robert A. retweetledi
Camus
Camus@newstart_2024·
Ray Kurzweil just said something that gave me pause. He believes AIs will soon be so indistinguishable from conscious beings that we’ll simply accept them as conscious — not because we’ll have definitive proof, but because it will become useless not to. He pointed out that people already have AI therapists, and some users are starting to treat them as genuinely conscious. As the technology improves, that acceptance will only grow. Kurzweil thinks the shift won’t take long: once AIs consistently show all the earmarks of consciousness, most people will just go along with it. It’s a quiet but profound prediction about how quickly our definition of “person” (or at least “mind”) might change. What do you think — how long until we treat AIs as conscious beings?
English
439
188
1.4K
146.6K
Robert A. retweetledi
Craig Weiss
Craig Weiss@craigzLiszt·
new rule: if you're a software engineer but refuse to use ai, you're not an engineer. you're unemployed
English
135
29
600
18.7K
Robert A.
Robert A.@robertauger·
@HackingLZ Good timing as property declines. Probably have a much nicer place now, congrats
English
0
0
0
111
Justin Elze
Justin Elze@HackingLZ·
Offer on new house accepted in Texas ✅ The house in NY had 18 showings and 20+ people at the open house, already has 2 offers over asking, and is accepting offers till Wednesday.
English
25
0
136
7.6K
Robert A. retweetledi
Nick Percoco
Nick Percoco@c7five·
Kraken Security Update We are currently being extorted by a criminal group threatening to release videos of our internal systems with client data shown if we do not comply with their demands. It’s important to start with the most important points: our systems were never breached; funds were never at risk; we will not pay these criminals; we will not ever negotiate with bad actors. Kraken identified and shut down two instances of inappropriate access to limited client support data. In February 2025, we received a tip from a trusted source regarding a video shared on a criminal forum that appeared to show access to our client support systems. We immediately launched an investigation and quickly identified the individual involved as a member of our support team. Their access was revoked immediately, a full investigation was conducted, additional security controls were put in place and a limited number of affected clients were notified. Since then, we have been collaborating with industry partners and law enforcement to investigate and disrupt insider recruitment efforts targeting not only crypto companies, but also gaming and telecommunications organizations. More recently, we received another tip, along with a new video showing similar activity. We quickly identified the individual involved and terminated their access. As before, we acted immediately to revoke access, conduct a full investigation, and notify the small number of affected clients. Across both incidents, only a very small number of client accounts were potentially viewed - approximately 2,000 in total (0.02% of clients). Shortly after access was terminated, we began receiving extortion demands. The criminals threatened to distribute materials from both the February 2025 incident and the recent incident to media outlets and on social media if we did not comply. We will not pay these criminals. Based on intelligence gathered across both incidents, along with extensive ongoing analysis, we believe there is sufficient evidence to support the identification and arrest of those responsible. We are actively working with federal law enforcement across multiple jurisdictions to pursue all individuals involved and bring them to justice. Due to the ongoing investigation, we cannot share additional details at this time. However, anyone with relevant information is encouraged to contact us directly. The security of our clients is our highest priority, and we remain fully committed to combating the growing global threat of insider recruitment and constantly enhancing our security practices to combat new threats. Note: If you are a client potentially affected by this, you've already been notified.
English
256
492
3.7K
1.2M
Robert A. retweetledi
SecInterviewHub
SecInterviewHub@sec_hub93028·
Always experiment with new tools. Test their claims. Verify, then trust.
English
1
1
3
171