
Doug Mohney
117.1K posts

Doug Mohney
@DougonIPComm
#broadband, #fiber #datacenter, gadgets,(aero)space. #satellite #iot. Trade shows. #Vegas & #CES sometimes. Continency bailout @[email protected]



A-10s Now Hunting Iranian Fast Attack Craft in the Strait of Hormuz U.S. Air Force A-10s in maritime attack role are hunting small Iranian fast attack boats that could threaten shipping or naval forces in the Strait of Hormuz. Story: theaviationist.com/2026/03/19/a-1…






La localisation du porte-avions français Charles de Gaulle rendue possible grâce à l'imprudence d'un marin utilisant l'application de running Strava, rapporte Le Monde. En faisant son footing sur le pont, il révélait la présence du navire.







HSGAC members are starting to leave the SCIF, where they reconvened to discuss an official trip MULLIN took in 2016 that he says is classified Became a point of contention in MULLIN’s nomination hearing for DHS this morning Sen. BLUMENTHAL says leaving that MULLIN was not more forthcoming in the SCIF & the situation is “weird.” Says it’s still a mystery why the info is classified & who classified it “Some of his answers raise additional questions and all of them go to his credibility,” BLUMENTHAL says

FED'S POWELL: THIS IS NOT STAGFLATION — WOULD RESERVE THAT TERM FOR FAR WORSE; MANAGING TENSION BETWEEN DUAL MANDATE; HOPES GAS PRICE RISE IS SHORT-LIVED

Kicking off RSAC season with one of my all-time favorite “you genuinely cannot make this up” stories in cybersecurity. A luxury casino got hacked through a fish tank. Not the payment systems, not the hotel network, not even a careless employee clicking a sketchy email. A smart aquarium in the lobby with sensors tracking water temperature, salinity, and feeding schedules so the facilities team could manage it remotely. A harmless convenience. A completely unmanaged endpoint sitting inside the network perimeter. Attackers found it exposed online, probably weak credentials or an unpatched interface, and used it as their way in. And then the fish tank stopped being the story. What followed was a textbook lateral movement play. Once inside, they mapped the network, escalated privileges, probed for accessible systems, and navigated toward the thing that actually mattered: the high-roller database. When it was time to get the data out, they routed roughly 10GB through the aquarium device itself. Slow, blending in with normal outbound traffic. No alarms, no friction. The same device that got them in became the exit channel. What makes this story impossible to forget isn’t the sophistication, it’s the asymmetry. The defenders were focused on protecting the crown jewels while the attackers started with the least protected thing on the network. Nothing about the fish tank screamed “attack vector.” That was the whole point. For years, cybersecurity thinking centered on traditional endpoints: servers, laptops, enterprise software. The attack surface was relatively bounded and you knew what you were defending. That world is gone. Modern environments are filled with cameras, medical devices, HVAC systems, smart lighting, conference room displays, factory floor sensors, and increasingly AI systems with broad API access and connections to sensitive data. Every one of them is effectively a computer that expands the potential attack surface, and almost none of them get the same patching discipline, network segmentation, or visibility as the “real” infrastructure. The fish tank wasn’t a weird anomaly, it was an early signal. Run the same scenario today and the entry point might be a connected infusion pump, an autonomous warehouse robot, or an AI agent with read/write access to systems no one thought to lock down. The pattern doesn’t change. Initial access comes from something overlooked, and standard techniques do the rest. Attackers rarely try the front door anymore. They look for whatever is easiest to reach and hardest to see. So the real question heading into #RSAC isn’t whether your core systems are secure. It’s what in your environment feels too small, too operational, or too irrelevant to matter, because that’s usually where the story starts. 🐟🔐



This is accurate. If you've spent much time around DCA, you'll also notice that many can simply bypass security screening altogether.











