cogio

404 posts

cogio banner
cogio

cogio

@CyberDevOG

building @BreachLens (BEC forensics for M365) cybersecurity nerd who ships learning in public, breaking in private python stdlib only, zero dependencies

the internet Sumali Haziran 2024
43 Sinusundan37 Mga Tagasunod
cogio
cogio@CyberDevOG·
@ZackKorman yeah this is the failure mode i keep designing around. i'm wiring agents into M365 audit logs for BEC triage and half the work is keeping the attacker's own email body from steering the agent. tight tool scope + structured output + classifier on inputs — still feels thin.
English
0
0
0
24
cogio
cogio@CyberDevOG·
@staskulesh the leverage isn't claude writing code — it's me getting better at writing the prompt. half my repo is now /commands and skill files instead of source.
English
0
0
0
8
Stas Kulesh
Stas Kulesh@staskulesh·
A single prompt in Claude Code
English
1
0
0
87
cogio
cogio@CyberDevOG·
@JoelKatz the gnarly part of this one: SPF/DKIM/DMARC all pass clean because the email IS coming from RH's infra. authentication checks tell you nothing here — detection has to move to content/behavior (weird device names, html in fields, suspicious account-creation patterns)
English
2
0
2
49
David 'JoelKatz' Schwartz
WARNING: Any emails you get that appear to be from Robinhood (and may actually be from their email system) are phishing attempts. Example:
David 'JoelKatz' Schwartz tweet media
English
125
464
1.9K
92.3K
cogio
cogio@CyberDevOG·
@levelsio ahaha mine still quotes time in pre-coffee senior dev hours. real loop now is: queue 3 prompts, refill tea, come back to a green PR
English
0
0
0
412
@levelsio
@levelsio@levelsio·
My Claude keeps saying "that's a day of work" when it's like done in 5 min 😂
@levelsio tweet media
English
357
23
1.5K
104K
cogio
cogio@CyberDevOG·
@munza14 @NikkeiAsia tradecraft is brutally consistent — forwarding rule, forged invoice, dual-approval skipped under deadline pressure. the part that never makes headlines is the triage after. pulling months of UAL across dozens of mailboxes is why i built breachlens.io
English
0
0
0
16
cogio
cogio@CyberDevOG·
@cyrilXBT the "rewrite the prompt 10 times until it clicks" loop is the actual curriculum. nobody learns claude code from a tutorial — you learn it from your own mistakes piled into CLAUDE.md until the agent finally stops doing the dumb thing
English
0
0
0
238
CyrilXBT
CyrilXBT@cyrilXBT·
I spent 6 months learning Claude Code the hard way. Every mistake. Every workflow that did not work. Every prompt I had to rewrite 10 times before it clicked. I turned all of it into a free masterclass: THE CLAUDE CODE MASTERCLASS. Zero to shipping your first project alone. No CS degree. No team. No guesswork. Inside you get: - The reframe that changes how you use Claude Code forever - The CLAUDE .md template that makes every session 10x more powerful - The 4-layer prompt architecture that scales to any project - MCP server setup nobody is teaching yet - The 6-phase sequence to go from idea to deployed in a weekend - 10 ready-to-run workflows you can copy right now The people who read this tonight will be building things next week that most developers still cannot do with a team. I should be charging $199 for this. It is free. Comment CLAUDE and I will send it to you directly. RT if you know someone who needs to see this.
CyrilXBT tweet media
English
1.2K
174
922
107.7K
cogio
cogio@CyberDevOG·
@NoahEpstein_ sqlite + fts5 over your own message history beats most rag setups for personal context. been doing the same with IR notes — grep wins 9/10 times for "where did i write that thing about oauth consent grants"
English
0
0
0
80
Nozz
Nozz@NoahEpstein_·
everyone's still arguing about vector DBs like agent memory is some unsolved problem. steipete just shipped 3 tiny CLIs that dump your full X, discord and whatsapp history into local sqlite with fts5 search. - birdclaw: your X (tweets, dms, mentions, archive) - discrawl: any discord server you can read - wacrawl: whatsapp desktop chats no embeddings. no RAG. no subscription. just sqlite + fts5 (the same thing your phone uses to search imessage). each one is a single binary. brew install. done. i'm putting birdclaw on the mac mini today. my writer-agent has been drafting takes i already posted because it has zero memory of what i've actually said. now it can grep my full archive in 50ms before every draft. the move isn't the tools, it's the shape. one tiny crawler per data source, all dumping to local sqlite. notioncrawl, telegramcrawl, gmailcrawl on the same recipe. Peter is just dropping dimes every other day.
Peter Steinberger 🦞@steipete

the crawl army so agents can read it all.

English
6
1
40
4.2K
cogio
cogio@CyberDevOG·
@SCMagazine @Mimecast tracks with what shows up post-compromise in M365. once they're in, the tradecraft is boring and identical: inbox rules, oauth app grants, MailItemsAccessed bursts. "targeting people" is the right framing for prevention but the IR signal lives in the audit log.
English
0
0
0
9
SC Media
SC Media@SCMagazine·
Insider threats, credential misuse, and user-driven errors now account for the majority of incidents, with attackers increasingly targeting people rather than systems, according to @Mimecast's 2026 State of Human Risk report. #cybersecurity #CISO #infosec bit.ly/4sZn4iX
English
1
2
6
552
cogio
cogio@CyberDevOG·
@HuntressLabs the AWS+CF infra angle is what guts most IP/ASN-based detections. once token replay lands you're chasing it in UAL — OfficeHome appId + new device + fast MailItemsAccessed. been writing my BEC triage flow around exactly this signal at breachlens.io
English
0
0
0
18
Huntress
Huntress@HuntressLabs·
In February 2026, EvilTokens weaponized Railway to stand up token-harvesting infrastructure at machine speed. → AI-generated lures tailored to role and industry → Legit Microsoft auth flows abused by design → Infrastructure running on trusted tooling like AWS and Cloudflare
Huntress tweet media
English
3
11
42
5.5K
cogio
cogio@CyberDevOG·
@nixxin the "paused bec started something else" bucket is too real — that's the entire ai coding loop right now. honestly 9 mostly-done out of 21 in 3 weeks is a way better hit rate than most builders i know
English
0
0
0
26
Nikhil Pahwa
Nikhil Pahwa@nixxin·
I counted: I have 21 vibe coding projects (in 3 weeks) in different stages of completion. - 9 are mostly done. 2 of them used 20/50 times/day. - 6 @ 1st/2nd draft stage. Paused bec I started something else lol. 3 are complex+ambitious - 4 @ early stage - 2 failed (will revisit)
English
2
0
3
520
cogio
cogio@CyberDevOG·
@realsohamparekh yeah these are getting really polished. same template hitting m365 tenants right now too — once someone consents to the "appeal" oauth app, mfa is already bypassed and there's nothing in the inbox to investigate
English
0
0
0
34
Can Vardar
Can Vardar@icanvardar·
build a cybersecurity company and go all in like your life depends on it
English
24
5
79
4.5K
cogio
cogio@CyberDevOG·
@c7five the fake-invoice version shows up in BEC cases too — victim wires the bad invoice, days later a "recovery firm" emails offering to claw it back for a fee. same crew. sometimes the original mailbox forwarding rule is still live and they're reading the recovery thread.
English
0
0
0
19
Nick Percoco
Nick Percoco@c7five·
A scam blowing up this year that nobody warns you about: the recovery scam. Here’s how it works. You get scammed once. Crypto, romance, fake invoice. Doesn’t matter. You realize, you panic, maybe you tell the scammer “I’m calling the cops.” They record that call. Then they wait 4 to 8 weeks. Then a “police officer” calls. Or a “lawyer.” Or someone from a “consumer recovery agency.” They know specific details about your scam. Because they ARE the people who scammed you. They offer to help recover your money. Just need an upfront fee. Gift cards work great, apparently. Or more crypto as a “recovery bond.” Rule: Anyone who contacts YOU first about money you lost is the scammer. Government agencies and law enforcement do not work this way. Ever. Share this. Send it to anyone who might be vulnerable to getting scammed TWICE.
English
17
37
158
23.7K
cogio
cogio@CyberDevOG·
@techspence yeah this. weirdly it's almost always the people who ship the least who are loudest about code quality. most prod code I've seen anywhere is duct tape, 2am decisions, and a test file nobody opens.
English
0
0
1
7
spencer
spencer@techspence·
I sometimes defend open source stuff that’s “vibe coded” because like why does it matter? The common argument is something along the lines of “they don’t know what the code does. They don’t know the code quality.” How many people who have written any code have been 100% satisfied with the code they wrote? Stop demonizing technology.
English
22
3
54
4.3K
cogio
cogio@CyberDevOG·
proper safeguards = audit logging on, alerts on new inbox/forwarding rules, dual-approval out-of-band before any wire. once it lands, the UAL + headers + login telemetry are the entire investigation. (kinda why i started breachlens.io — that triage by hand at 1am is brutal.)
English
0
0
0
4
The Morning
The Morning@TheMorningLK·
Cybersecurity expert Asela Waidyalankara says the recent $2.5 million Treasury cyberattack, carried out using a Business Email Compromise (BEC) method, could have been minimized with proper safeguards. He noted that while Sri Lankan banks follow strict standards like ISO 27001, similar controls appear lacking in institutions handling public funds, highlighting gaps in cybersecurity management and oversight.
The Morning tweet media
English
2
2
9
1.3K
cogio
cogio@CyberDevOG·
@NewsWireLK spot on. most BEC i investigate has zero "hacking" — usually a forwarding rule the user never noticed, an invoice that looks legit, and a payments person under deadline pressure. catch isn't EDR, it's dual-approval + out-of-band callback before any wire change.
English
0
0
0
3
NewsWire 🇱🇰
NewsWire 🇱🇰@NewsWireLK·
“Don’t insult hackers — this is not hacking. It falls into a different category. This is what we call a Business Email Compromise (BEC), a very simple impersonation technique,” Sarvajana Balaya leader Dilith Jayaweera said, adding that the Treasury fund compromise has caused serious damage to the country’s reputation.
English
18
11
59
4.8K
cogio
cogio@CyberDevOG·
@HackRead the patch is the easy part. the harder question: are tenants actually going back through their UAL to see if this got abused before the fix landed? service principal credential adds disappear into normal admin noise — that gap is exactly why i built breachlens.io
English
0
0
0
9
cogio
cogio@CyberDevOG·
@larsencc persistent agent on a server is the unlock — every workflow longer than a coffee break dies on me with the laptop-closes problem. been hacking together a duct-tape version of this. gonna take bux for a spin.
English
1
0
0
452
Larsen Cundric
Larsen Cundric@larsencc·
Introducing: Browser Use Box (bux). Your 24/7 personal agent box, powered by Browser Harness. ♞ We got tired of agents that vanish when you close the laptop. So we put them on a server. > 24/7 box that runs while you sleep > Real Chrome with persistent logins > Telegram baked in, text from anywhere I gave mine my email and a Telegram chat. It books flights, replies to LinkedIn and does my to-do list before I'm awake. Try it at cloud.browser-use.com/bux
English
52
80
844
276.9K
cogio
cogio@CyberDevOG·
@arvidkahl hard agree. been writing my IR runbooks in .md for exactly this reason — me and whatever LLM i hand the case to parse it the same way. structured prose is the new API.
English
0
0
1
7
cogio
cogio@CyberDevOG·
@dvassallo passkeys shipped on a vibe-coded racing game outpaces 80% of b2b saas auth i've seen in IR. the second you commit to webauthn the phishing-resistance debate just disappears. nice work.
English
0
0
1
132