baked beans

5.7K posts

baked beans banner
baked beans

baked beans

@beans1990

Cyber Sales Engineer Ex Boeing Ex Lockheed Polemicist Life Analyst Veteran #CertaCito WoW nerd Patiently waiting for Doors of Stone

Gold Coast, Queensland شامل ہوئے Ekim 2013
717 فالونگ321 فالوورز
پن کیا گیا ٹویٹ
baked beans
baked beans@beans1990·
It's crazy to see the dialogue and justification everyone has been using around the banning of speech, protesting and use of force by the police in Sydney. None of this should even be happening and people can't see that the more cheer for either side's punishment and demise, the more things are going to get worse for everyone. To be clear, banning protesting is bad, banning speech is bad, calling for the death of anyone is bad and cheering on state driven violence is abhorrent. If you want to make a difference, get involved with whatever political party you believe will make the difference you want. Don't go out in public and scream death to whatever. Also, be consistent. You can't, on one hand, cry genocide for one group but ignore genocide perpetrated elsewhere by the people who fund the terrorist organisations that are central to the reason this all kicked off in the first place. For example you can't be okay with the jailing or deportation of a neo nazi for online posts but then be fine with calling for the death of Israel. This is hypocritical. The biggest issues in my opinion are, first and foremost l, Foreign influence in Australian politics. Blatant corruption and lying by politicians, we've been living through the worst reduction in quality of living in decades and they're taking us for a ride. People wailing about problems elsewhere with zero impact on Australians. We've got an ever increasing homeless problem, immigration that is out of control which does nothing except to inflate our housing market and enrich the geronotocracy. The economic outlook for the short, medium and long term in Australia is the worst it's been for the last 40 years. Australia's focus needs a reset and redirected to the actual issues that matter for Australians living here. We need a sharp shift back to libertarianism and pluralism. If we don't start to improve things soon we're heading for the same position as the UK is in and much of the EU. We don't have a constitution that embeds individual freedoms like the US does which means it's far easier for us to slide into Authoritarianism. What we are seeing now is not quite there but that's the direction we are heading. Regan said this in his inaugural address in 1967 and it's as true today as it was then. "Perhaps you and I have lived too long with this miracle to properly be appreciative. Freedom is a fragile thing and it's never more than one generation away from extinction. It is not ours by way of inheritance; it must be fought for and defended constantly by each generation, for it comes only once to a people. And those in world history who have known freedom and then lost it have never known it again." Global order is shifting, security isn't a guarantee. We need to look out for Australians first above all, we need to think about how we want to leave this beautiful country of ours for the future generations. This is all going to take some difficult but honest and pragmatic conversations around what we think we are doing, with a focus on the outcomes because most of the outcomes don't benefit the people we want to help. Australia first 🇦🇺🐨🦘🪃
English
0
0
1
134
baked beans
baked beans@beans1990·
The part of the Solarwinds attack that stood out to me was their use of steganography. Every single time I ever learnt and then taught people about stego it was always one of those easy to understand ideas about hiding data inside, what appears like benign data. It was never followed up with real world examples other than some reference to 1500's art or ancient greek texts. So I absoloutley geeked out when reading the Solarwinds after action report. This was the first time I recall reading about the use of stego in the post exploitation phase to remain hidden.
English
0
0
0
84
vx-underground
vx-underground@vxunderground·
Part of TeamPCP's success thus far has been the speed in which they operate. tl;dr teampcp doing lots of supply chains, exhausting, smash and grab passwords, runaway, really tiring Generally speaking, large scale supply chain attacks are quiet with the focus being silence and espionage. A notable example of this is SOLARWINDS supply-chain attack which was conducted by the Russian Federation. The goal is to discretely insert malicious code into a products update cycle. The payload would (under ideal circumstances) execute with specific triggers in place and BE QUIET. They don't want to set off any metaphorical alarms. You quietly watch and SLOWLY work. TeamPCP (as of this writing) has focused on information exfiltration (stealing sensitive data, primarily credentials) which is more akin to a smash-and-grab rather staying silent and watching what people are doing with their binoculars. A successful supply chain attack can be a DFIR (Digital Forensics and Incident Response) nightmare. Many organizations do not have an internal DFIR on staff, hence they consult with external entities. Suddenly with a supply chain attack you've got dozens of organizations contacting the same group of companies needing a forensic investigation launched. These DFIR's can take time with reporting, identifying victims, potential PII or sensitive documents stolen, cooperation with law enforcement and legal departments (or external law firms) ... it can take days, weeks, or (depending on the scope of impact and bureaucracy) months. And then suddenly there is another supply chain attack ... and then another ... and then another ... and then another ... with a total of 50 as of this writing. The best I can describe what I'm currently seeing is a "DFIR resource exhaustion" technique. If you've got only a handful of DFIR firms spread thin across a dozen of so companies and then ANOTHER supply chain attack happens AND THEN ANOTHER AND THEN ANOTHER, with some organizations potentially being hit multiple times, it's a nightmare come alive. TeamPCP (as of what we've learned thus far) successfully used a supply chain attack to pivot to other supply chain attacks. They're chaining chains. The concern now is they've performed 50 supply chain attacks in 8 days. Is there anymore coming? Has any other vendor failed to rotate their security credentials correctly? Is any company not cooperating? What data was stolen? How many companies are even impacted? How many are unaware of what happened? How much user PII was stolen? How were these other supply chain attacks conducted? The current prevailing theory is all of these supply chain attacks are the result of the initial Trivy supply chain attack, however (unironically) DFIR work must be conducted and more investigative work needs to be performed. It is dangerously to assert with high-confidence it is the result of the Trivy supply chain attack. If you're wrong, what if it's from something else we're not aware of yet? I'm sure not all details are public (yet). More information will come out eventually. This sort of DFIR work would take months but now it's a race against the clock hoping another doesn't occur. 2026 starting off strong.
English
14
50
381
19.8K
baked beans
baked beans@beans1990·
@pcpcats @IceSolst @xpl0itrs At this point I feel like im better off buying $150 worth of tissues to cry into instead of thousands towards SaaS security products.
English
0
0
2
134
TeamPCP
TeamPCP@pcpcats·
@IceSolst @xpl0itrs The amount of money we have spent on this campaign so far has to be under $150 USD, imagine what a state sponsored threat could do with this level of access.
English
10
5
129
32.6K
solst/ICE of Astarte
Fascinating seeing security companies are so much worse at responding to incidents than non-security companies Both aqua and checkmarx didn’t do a good job. LiteLLM handled it much better. Curious!!
DFIR Radar@DFIR_Radar

TeamPCP supply chain campaign scope expanded beyond initial reports with new CISA KEV entry and detection tools now available. Campaign timeline spans Feb 28 initial access through March 24 LiteLLM PyPI compromise. #DFIR_Radar

English
10
18
183
16.9K
baked beans
baked beans@beans1990·
@0xTib3rius I found that as soon as I do any work outside of hours like past 5pm for me usage just evaporates
English
0
0
0
21
Tib3rius
Tib3rius@0xTib3rius·
4 prompts just reviewing previous work this morning, and I'm at 61% of my session limit, on the $100/mo plan. I love Claude Code but this is getting really stupid.
Tib3rius tweet media
English
67
20
668
58.4K
baked beans
baked beans@beans1990·
@nikitabier Wrong, making a homogenised and sanitised internet was the mistake.
English
0
0
0
4
Nikita Bier
Nikita Bier@nikitabier·
The Internet was a mistake
English
7.6K
1.9K
19.6K
2M
baked beans
baked beans@beans1990·
Why is the government going to make something cheaper that is running out? If we do run out of fuel its insanely damaging to every part of our economy and could result in famine if not rectified quickly? Oh its socialism, thats why.. Silly me..
English
0
0
2
11
baked beans
baked beans@beans1990·
I am so looking forward to my Easter break, im taking my family and in-laws up to Harvey Bay. My only concern is I feel like I need to go stock up on diesel now so I can at least get there and back.
English
0
0
0
12
baked beans
baked beans@beans1990·
@bowtiedstocks Having spent the better part of my career trying to articulate risk of these systems to boards, I cannot agree more. Its like talking in numbers too large to comprehend because they have no reference to what anything means.
English
0
0
2
185
BowTiedStocks
BowTiedStocks@bowtiedstocks·
Aussie boardrooms are funny places They’re great at sitting around pontificating on the outlook for interest rates and oil prices etc and what it means for the business But not one of them will understand the complex web of IT systems on which their foundation of ‘truth’ is based
English
13
0
64
4.6K
xpl0itrs
xpl0itrs@xpl0itrs·
@IceSolst hey solst, ready for the next supply chain attack?
English
4
1
15
7.5K
solst/ICE of Astarte
Detection engineers have a challenge, EDR won’t cut it. We’ll need ADR (we have it defined for ‘application’ but should also include ‘agent’)
Alexander Mackie@ZanderMackie

@IceSolst Any sufficiently advance LLM tool is indistinguishable from malware.

English
10
4
112
13.3K
baked beans
baked beans@beans1990·
@Mark_Graph Love it! One metric that I think should be monitored (if its possible) is voting intention to Gerard Rennick. I suspect if we see Hanson throw herself behind the US, Israel or the war people will turn away from her. In my opinion, Gerard Rennick is the only other realistic option
English
1
0
1
97
baked beans
baked beans@beans1990·
@theonejvo I feel like chasing the noise at this point is as bad as recording yourself doing a tiktok dance.
English
0
0
1
7
Jamieson O'Reilly
Jamieson O'Reilly@theonejvo·
@beans1990 Totally agree with you here. The ship analogy hits, a nd I respect how selective you're being about where you invest your time. That's the move for actually deepening your understanding rather than just chasing noise.
English
1
0
1
31
Jamieson O'Reilly
Jamieson O'Reilly@theonejvo·
Traditional cyber companies that don't adopt attack AI now are getting left in dust, it couldn't be more clearer after coming out of a meeting this week with a well known cybersecurity consultancy - 500+ staff, with a solid name in the industry. What was interesting for me to see, is just HOW unprepared alot of these companies are, especially when they're supposed to be household name leaders in their own rights. Concerning, when you remember these same companies are the ones that hold cyber service agreements with the banks and other critical services you and I use everyday. I have good reason to assume this purely based on both their smug attitudes in regards the questions they were asking. Shit like "😏 yeah buh how you gonna deal wiv context loss, surely you can't say it's going to hold up to a team of humans who are working over multiple days, sometimes weeks" You should've seen the looks on their faces when I told them about our 100+ hour attack agent runs where the agent is holding strong context throughout the whole process. The biggest issue they have right now, and (shameless plug incoming) why they are going to either get eaten by the likes of @tryaether_ai or end up using capabilities like it, is that they've gotten too comfortable. I mean this is far from surprising to anyone as it's just the circle of life. That is, where you either get so big you can't fail, or you get comfortable in the middle ground and end up getting out engineered by the cracked solo/small units. Anyways, it was very encouraging to see, given the fact that I'm building the future of attack & defence AI and it's a positive signal that we're truly touching upon novel aspects.
English
3
0
9
1K
BowTiedStocks
BowTiedStocks@bowtiedstocks·
In my opinion Australia doesn’t reward hard working intelligent and educated people enough Stop go union operatives pulling in more than qualified medical or engineering professionals Tax the high earners to death so we can pay people to walk dogs for $90 an hour as NDIS carer dog walkers I can see why we suffer a ‘brain drain’ where our best and brightest leave for greener pastures where their skills are better valued by the marketplace And those that stay just wanna play leveraged propadee roulette, because let’s face it we’re not that bright Not a serious country
English
56
27
658
20.4K
baked beans
baked beans@beans1990·
Its crazy to me that super funds arent building recession/depression proof asset classes
English
0
0
0
11
baked beans
baked beans@beans1990·
@DanielW_Kiwi Create your own? I am isolating as much as possible, minimal permissions, pinning deps, lock files, sast and HIDS/NIDS. If there is something else im missing let me know.
English
0
0
1
29
Daniel 🦔
Daniel 🦔@DanielW_Kiwi·
@beans1990 It's scary that supply chain attacks are so common now. What do we do? Sandbox everything?
English
1
0
2
40
Daniel 🦔
Daniel 🦔@DanielW_Kiwi·
The state of this is insane. A critical vulnerability is released. What are the comments? Nothing but AI noise
Daniel 🦔 tweet mediaDaniel 🦔 tweet media
English
8
1
56
3.5K
Daniel 🦔
Daniel 🦔@DanielW_Kiwi·
@beans1990 I heard a little. That is terrible. We are in dark times.
English
1
0
2
300
𝕱𝖔𝖗𝕷𝖔𝖔𝖕
if you really have higher iq and understand how important tokens are, you should start coding in mandarin and see how token efficient it is
𝕱𝖔𝖗𝕷𝖔𝖔𝖕 tweet media
English
86
123
2.5K
154K
that stock chick
that stock chick@ausstockchick·
We are back baby 👏🏼🥰 $ASX
that stock chick tweet media
English
16
1
33
1.9K