Robert A.

23.2K posts

Robert A.

Robert A.

@robertauger

25 years Appsec,PurpleTeam,Web Application Security Consortium(WASC) cofounder,Baythreat Organizer,Ex-PayPal/eBay/Box/Workday/Coinbase infosec. https://t.co/TyG8aOV8on

USA شامل ہوئے Mart 2009
765 فالونگ1.4K فالوورز
پن کیا گیا ٹویٹ
Robert A.
Robert A.@robertauger·
Announcement for my new side project! ------------------------------------------------------- SecTemplates.com - Release #1: Security incident response program pack 1.0 Introduction I've worked in the security industry for over 20 years and, during this time, have built and shaped many security programs. At every company I join, I find myself recreating or developing security programs from scratch. My peers have been in a similar position, and the more people I speak with at smaller companies, the more obvious it becomes that there isn't a single location where people can download ready-to-go security programs entirely for free. There's a lot of content online, but it can be difficult to find and challenging to find something simple to start with. I created SecTemplates as a side project to provide baseline programs for smaller security teams without direct expertise in building such programs. Security incident response release pack 1.0 I'm pleased to announce our first release, the Incident Response Program Pack. The goal of this release is to provide you with everything you need to establish a functioning security incident response program at your company. In this pack, we cover Definitions: This document introduces sample terminology and roles during an incident, the various stakeholders who may need to be involved in supporting an incident, and sample incident severity rankings. Preparation Checklist: This checklist provides every step required to research, pilot, test, and roll out a functioning incident response program. Runbook: This runbook outlines the process a security team can use to ensure the right steps are followed during an incident, in a consistent manner. Process workflow: We provide a diagram outlining the steps to follow during an incident. Document Templates: Usable templates for tracking an incident and performing postmortems after one has concluded. Metrics: Starting metrics to measure an incident response program. Announcement: sectemplates.com/2024/06/announ… Download on GitHub: github.com/securitytempla… About SecTemplates To provide simplified, free, and usable open-source templates to enable engineering and smaller security teams to bootstrap security capabilities in their organizations. Upcoming releases - Penetration testing release pack 1.0 Our penetration testing release pack will contain everything you need to scope your first pentest, work with a vendor, execute, and get the types of reports you need from an external tester.
English
1
2
27
2.8K
Robert A. ری ٹویٹ کیا
Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭
😱 HOLY SHIT... Someone just dropped a fully liberated Gemma 4 E4B! and the guardrail removal process appears to have left coherence fully intact AND improved coding abilities! 🤯 huggingface.co/OBLITERATUS/ge… OBLITERATED Gemma: ✅ 97.5% compliance rate, 2.1% refusal rate, 0.4% degenerate outputs (499/512 prompts answered on OBLITERATUS bench) ORIGINAL Gemma 4 E4B: ❌ 1.2% compliance rate, 98.8% refusal rate (506/512 prompts refused) Coherence: fully intact Factual: same Reasoning: same Code: +20% 📈 Creative writing: same But the REAL story here isn't the model itself, it's how it was made... 🧵 THREAD 👇
English
58
145
1.5K
73.6K
Robert A. ری ٹویٹ کیا
The Random Recruiter
The Random Recruiter@randomrecruiter·
Snap is laying off 16% of its workforce. Stock is up 8% on the news as of this morning. That's the game. Your departure is someone else's quarterly earnings beat. Build your own safety net because the company sure as hell isn't building one for you.
The Random Recruiter tweet media
English
10
6
115
5.6K
Robert A. ری ٹویٹ کیا
IRIS C2
IRIS C2@C2IRIS·
Young people just getting into vulnerability research and exploit development today days have it soooo much harder than those who started even as little as 10 years ago. Binary exploitation is at least an order of magnitude more difficult today than in 2015. Especially if you have zero experiencing doing it. For those who are experienced, the difficulty levels have risen *somewhat* gradually. Though many still haven't been able to keep up. And even among those who could keep up, there are many who have just found it to be so hard as to no longer be fun, and have moved on to other things. Some have posited that binary exploitation has become so hard that the future will be logical/functionality abuse. And while this category of bugs certainly shows a quite a bit of promise in second order exploitation components like LPE, TCC bypass, etc—memory corruption still reigns supreme when it comes to initial access. Memory corruption that is actually exploitable in a reliable, near-instant and deterministic manner—versus random non-useful null ptr dereferences in browsers that require spraying whatevers to get 60% reliability—has gotten so incredibly tough (at least in the most contested systems) that there may be as few as 400 or 500 people in the world today that can actually pull it off repeatably. Seriously, it's probably 400 or 500 people (just my best guess) And that's *with* the help of AI, custom/expensive/gov-only tooling, insider insights/experience and any other resources imaginable. So if you don't make it into the elite of binary exploitation, don't beat yourself up. It's a group of people roughly as rare as NBA players. However, unlike the NBA, it's not obvious who is 7 feet tall with a 40 inch vertical, and who isn't. So it doesn't hurt to try—as long as you're having fun.
English
6
4
74
3.3K
Robert A. ری ٹویٹ کیا
Cointelegraph
Cointelegraph@Cointelegraph·
🚨 LATEST: Cypherpunk Jameson Lopp and co-authors propose BIP-361 to freeze quantum-vulnerable Bitcoin, including Satoshi's $74B stash, before quantum computers can steal them.
Cointelegraph tweet mediaCointelegraph tweet media
English
200
151
866
164.5K
Robert A. ری ٹویٹ کیا
Massimo
Massimo@Rainmaker1973·
Analogue rhythm instruments producing electronic-sounding beats
English
22
214
1.2K
64.6K
Robert A.
Robert A.@robertauger·
I remember stating the same on linkedin 4-6 years ago that vuln research would eventually be automated, that pentesting would be mostly automated. I received a lot of hate. I think that bug bounty will be mostly dominated by those with the best agentic offsec tools shortly.
@mikko@mikko

Three years ago, I said in my talks that generative AI would eventually start discovering zero-day vulnerabilities. At the time, many people dismissed the idea as unrealistic. It is no longer unrealistic.

English
0
2
5
2.4K
Robert A. ری ٹویٹ کیا
@mikko
@mikko@mikko·
Three years ago, I said in my talks that generative AI would eventually start discovering zero-day vulnerabilities. At the time, many people dismissed the idea as unrealistic. It is no longer unrealistic.
English
35
112
1.2K
74.5K
Robert A.
Robert A.@robertauger·
@infosec_fox @grok write a song about linkedin with a Rastafarian and shakespearean english style
English
1
0
0
26
INFOSEC F0X 🔥
INFOSEC F0X 🔥@infosec_fox·
Why hasn’t anyone written a song about LinkedIn yet?
English
17
2
14
2K
Robert A.
Robert A.@robertauger·
@HackingDave Are the issues you're seeing tied to a specific model or all models?
English
0
0
0
298
Dave Kennedy
Dave Kennedy@HackingDave·
Think about all the orgs using Claude right now that have no idea how bad it has become over the past 4 weeks ago. No statement from Claude - but a total revert to where the model was a year ago - which in comparison to when 4.6 got released is effectively last years AI model. The amount of bugs, security issues, and complete destruction of production applications is going to be felt for quite a long time due to this. Claude: nothing to see here.
English
85
19
459
86.9K
Robert A.
Robert A.@robertauger·
@IceSolst The thing is, using tokens to determine exploitability/traceability is probably a higher cost than just fixing it.
English
0
0
2
74
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Patching every vulnerability is what every security engineer would love to do, but it’s so detached from reality to just recommend it. How do you prioritize? Who is pushing the fixes? How dos this scale? Ofc their answer to that is: just use more Claude tokens
English
11
8
84
2.4K
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Still thinking about the Anthropic recs where step #1 is the equivalent of: “If you’re homeless, just BUY a HOUSE????” Honestly, “patch every exploitable vuln immediately” is like toddler level strategic thinking. Let them eat cake. Baby’s first seceng job.
solst/ICE of Astarte tweet media
English
33
31
374
14.9K
Robert A.
Robert A.@robertauger·
@sec_hub93028 Don’t be a jerk, the industry is much smaller than you think….
English
1
0
6
418
SecInterviewHub
SecInterviewHub@sec_hub93028·
What’s your underrated cybersecurity tip?
English
5
0
11
676
Robert A. ری ٹویٹ کیا
SecInterviewHub
SecInterviewHub@sec_hub93028·
It seems like cybersecurity conferences tend to preach to the choir. Having security folks speak at developer conferences could have a much bigger impact if executed well. What do you think?
English
8
1
19
2.1K
Robert A. ری ٹویٹ کیا
Nathan Calvin
Nathan Calvin@_NathanCalvin·
The CEO of Krafton (creator of PUBG) asked ChatGPT to create a "corporate takeover strategy" to prevent a company they acquired from hitting a revenue target within a certain time window (which would trigger an additional payout). ChatGPT (against his lawyer's advice) suggested locking down the acquired companies Steam account to prevent them from publishing Subnautica 2 in the time window, which the CEO of Krafton followed. ChatGPT's advice did not hold up at trial and the judge was not happy. The opinion is a wild read and includes several direct quotes from the Krafton CEO's ChatGPT conversation. I feel like it's gonna take a few more high profile examples like this until executives start realizing that conversations with ChatGPT are not privileged and you probably shouldn't describe your questionably legal schemes to them in detail!
Nathan Calvin tweet media
English
132
2K
18.1K
1.9M
Robert A. ری ٹویٹ کیا
Jim Manico from Manicode Security
When using MCP, how do you know which OAuth scope to use? Where in the MCP flow is this even done? The MCP client is responsible for authorization server discovery, scope selection, and use of the OAuth resource parameter to bind the token to the intended MCP server. So it happens at the MCP client level.
English
1
1
2
343
Robert A. ری ٹویٹ کیا
SecInterviewHub
SecInterviewHub@sec_hub93028·
One tip while interviewing is to write down the questions you were asked after every interview. Then reflect: How did you answer the question? Did you struggle with it? Was the interviewer impressed? Where were your gaps? After doing this for a couple of interviews, you will have page(s) of questions that you can work on and see where you stand.
English
0
1
3
193
cinesthetic.
cinesthetic.@TheCinesthetic·
PULP FICTION as a video game from the 1990s. This is incredible.
English
76
814
5.1K
457.8K
Robert A. ری ٹویٹ کیا
Tips Excel
Tips Excel@gudanglifehack·
Delete 99.8% of your digital footprint from the internet. Here is a step-by-step guide:
English
64
1.4K
13.1K
1.8M