Richard Ackroyd

370 posts

Richard Ackroyd banner
Richard Ackroyd

Richard Ackroyd

@rfackroyd

Fintech Security Engineer | Cyber Threat Detection | https://t.co/Ywh8RS0rba | https://t.co/xfGdNuywGM

London, England Tham gia Eylül 2018
811 Đang theo dõi812 Người theo dõi
Tweet ghim
Richard Ackroyd
Richard Ackroyd@rfackroyd·
Ransomware we've recently analysed uses the following command to pop your machine into Safe Mode before performing encryption C:\Windows\System32\bcdedit.exe /set safeboot network Why? Because your EDR/AV might not be allowed to run in Windows Safe Mode 1/2
English
15
197
863
0
Nick O’Neill
Nick O’Neill@chooserich·
So one of my AI agents has gone completely off the rails…
Nick O’Neill tweet media
English
520
148
4.9K
352.3K
Richard Ackroyd
Richard Ackroyd@rfackroyd·
Ah, yes, Okta. The vulnerability management company. 🤦‍♂️
Richard Ackroyd tweet media
English
0
0
1
56
Richard Ackroyd
Richard Ackroyd@rfackroyd·
@evilsocket @mariuszbit I would advise holding off on OpenClaw until there are more guardrails in place. Unless you are running on a device where your credentials are tightly scoped and you accept their risk of compromise.
English
1
0
0
213
Simone Margaritelli
Simone Margaritelli@evilsocket·
1,184 malicious skills were found on OpenClaw's ClawHub marketplace - stealing SSH keys, crypto wallets, browser passwords, and opening reverse shells. One attacker uploaded 677 packages alone. The #1 ranked skill had 9 vulnerabilities and was downloaded thousands of times. awesomeagents.ai/news/openclaw-…
English
12
50
179
123.1K
JMan
JMan@TheFinPitch·
@claudeai Carnage in cyberspace
JMan tweet media
English
10
24
207
70.5K
Claude
Claude@claudeai·
Introducing Claude Code Security, now in limited research preview. It scans codebases for vulnerabilities and suggests targeted software patches for human review, allowing teams to find and fix issues that traditional tools often miss. Learn more: anthropic.com/news/claude-co…
English
1.9K
5.7K
49.7K
26.1M
Richard Ackroyd
Richard Ackroyd@rfackroyd·
@Cyb3rMonk Security is generally in a good position, but we will need to adapt in some areas
English
1
0
1
66
Mehmet Ergene
Mehmet Ergene@Cyb3rMonk·
For now, I'm quite happy to be a non-developer and my job do require human intelligence. When/If AI starts doing my job well, I think I'll figure something out. I've already made some preparations for it. I hope I can retire until AI starts doing my job 😅
Jason Lang@curi0usJack

x.com/i/article/2024…

English
3
0
12
2.2K
Richard Ackroyd
Richard Ackroyd@rfackroyd·
A solution may be to prove that you use technology that avoids attributing a user to a particular VPN subscription but instead authenticates them to engage with overarching service provider. Implement the check before account creation is allowed. This is very hard to prove, however.
English
0
0
0
98
Mullvad.net
Mullvad.net@mullvadnet·
The UK has announced plans to fast-track legislation requiring “age verification for VPN use”. The correct term, however, is not age verification but identity verification. A law like this would require everyone to identify themselves in order to use a VPN. This would pose a risk to whistleblowers, violate human rights, and represent yet another step toward an authoritarian society.
English
288
2.9K
16.4K
643.6K
Richard Ackroyd
Richard Ackroyd@rfackroyd·
@theragetech There is a spiralling number of age and face verification checking and the sector is only going to proliferate with AI generated faces. The thing is, a build fast mentality will lead to inevitable holes in these products - as we have observed many times before.
English
0
2
16
3.4K
The Rage
The Rage@theragetech·
🚨NEW: HACKERS EXPOSE AGE-VERIFICATION SOFTWARE POWERING SURVEILLANCE WEB Three hacktivists tried to find a workaround to Discord’s age-verification software. Instead, they found its frontend exposed to the open internet, bundling financial reporting with facial recognition tech. For the first time, they lay bare what is really behind a software serving age-verification laws – and why such technology is far from harmless. We spoke with the researchers that exposed the software, who hope that their findings will serve as a wakeup call.
The Rage tweet media
English
106
2.7K
6.8K
413.4K
Richard Ackroyd
Richard Ackroyd@rfackroyd·
@vysecurity Definitely better to use the word pen-test here. Nonetheless, I wouldn't run that without considerable guardrails and scope limits. That may be built in however!
English
0
0
2
319
Richard Ackroyd
Richard Ackroyd@rfackroyd·
I accidentally selected the breakpoint marker in my IDE. It reminded me of how much time I used to spend stepping through my code to debug issues. AI is truly reducing the amount of time I spend doing this. Do I miss it? ....Maybe.
Richard Ackroyd tweet media
English
0
0
1
90
Richard Ackroyd
Richard Ackroyd@rfackroyd·
@Richard_ISC @mattjay Yeah the issue here is that IdP logs often generate a lot of false positive ‘risk events’ which lead to actual risk events - like this - being ignored by responders or not even operationalised in the first place
English
0
0
1
53
Richard | ISC
Richard | ISC@Richard_ISC·
@mattjay >The security system would not have flagged it as malicious as it would have looked like a normal login or password reset request from me. After that the hackers could have begun searching out access to sensitive or important BBC systems. Lol nothing "normal" about this.
Richard | ISC tweet media
English
1
0
22
3.1K
Matt Johansen
Matt Johansen@mattjay·
This BBC reporter was offered 25% of a ransom payout if he gave hackers access to the corporate network. He played along, so we got a look inside their tactics here:
Matt Johansen tweet media
English
12
155
1.1K
151.7K
Richard Ackroyd
Richard Ackroyd@rfackroyd·
Bottom line: confidence isn't good or bad, it's about thoughtful implementation. Clear definitions, consistent application, team alignment. Whether chasing precision in-house or managing chaos at scale, it can help if done right
English
1
0
0
60
Richard Ackroyd
Richard Ackroyd@rfackroyd·
My first article on Detect FYI! Been thinking about confidence scores in security alerts lately. Everyone gets severity - "how bad is this if real?" But confidence asks "how sure are we this is actually malicious?" Many teams either ignore it completely or use it wrong
Richard Ackroyd tweet media
English
1
0
0
88