Vulnerability only affects SMB servers using the experimental ksmbd module (Intro'd in Linux 5.15). If your SMB server uses Samba, you're safe. If it uses ksmbd, an attacker with read access could leak your server's memory (similar to Heartbleed). zerodayinitiative.com/advisories/ZDI…
⚠️ Censys is tracking a critical vulnerability that has been found in applications using OpenSSL version 3.0.0 and above. Learn more about the potential impact and how to identify vulnerable hosts in our latest blog: hubs.li/Q01r7mD_0#OpenSSL
The measure of a security team is what they say when you ask them:
What’s currently facing the internet?
How many total systems do you have?
Where is your data?
How many vendors do you have?
Which vendors have what kind of your data?
I guess this is why MSRC still don't consider Admin -> Kernel a security boundary.... I guess they prioritized shipped a new shittier UI and forcing TPM requirements over basic security features they've been crowing about for years.
Asking how to get int #InfoSec is the same thing as asking how to work with cars.
It is not specific enough.
Do you want to design, build, ship, sell, drive, repair, or scrap cars?
If you know what you want it becomes easier to recommend a learning path.
Yet another reason to block #AzureAD directory sync soft match. And while you're doing that, block the takeover through hard match too. You DO NOT need those features for anything!
Yet another reason to block #AzureAD directory sync soft match. And while you're doing that, block the takeover through hard match too. You DO NOT need those features for anything! https://t.co/8Foa1Tu4yA
The typical "100% log collection coverage" I've reviewed in my life consisted of OS level logs from 90% of the systems 😛, some service logs and rarely an application log
Many applications appear to rely on Environment Variables such as %SYSTEMROOT% to load DLLs from protected locations.
By changing these variables on process level, it is possible to let a legitimate program load arbitrary DLLs.
Full blog post here 👉 wietzebeukema.nl/blog/save-the-…
@rj_chap@CD_R0M_@smellyfeetuhave@IcsNick@jamieantisocial@SwiftOnSecurity It looks stupid, but whenever I give small workshops on MDE, I tell clients to export from TVM a list of all installed software like... once a month and review them. They'll discover how many random software users installs and spot the random AnyDesk, Teamviewer, Tor, etc.
Finally, the only daily, global, free map of GPS interference has officially launched: gpsjam.org Watch jamming around conflict zones develop over time. Wonder who's jamming GPS all around Moscow. Like all the best maps, it raises more questions than it answers!
4K Followers 5K FollowingСлава Україні! Most important job: being Dad; I also love to help people deny attackers the opportunity to break and steal all the things. Pronouns: He/him
222 Followers 980 FollowingDFIR now, Former Unix admin, Homelabber, Cyberpatriot tech mentor/volunteer. Husband, Dad, Friendship is Magic. All tweets are my own.
89 Followers 362 FollowingInfoSec speaker and blogger at https://t.co/pZHMnQS3Sl. ex. https://t.co/H7E85Ak73B SecLead. Debian and OpenBSD fanatic. Open for side gigs.
253K Followers 185 FollowingOfficial account of the Metasploit Project, part of the @rapid7 family.
Mastodon: @[email protected]
Slack: https://t.co/ZOLPDG2O2s
113K Followers 521 FollowingMITRE ATT&CK® - A knowledge base for describing the behavior of adversaries. Replying/Following/Re-tweeting ≠ endorsement. @ https://t.co/wt46ArkZVt
77K Followers 765 FollowingEnd-to-end Cybersecurity consulting team leading the industry, supporting organizations, and giving back. #Hacktheplanet
Blogs, news, webinars, and tools!
1K Followers 671 FollowingDCGVR uses VR to bring DEF CON to those who can't attend in person - offering talks, panels, and socializing since DC28. Inclusive. Immersive. Global.
449 Followers 40 FollowingThe Mindful Business Security Show is a call-in radio style podcast for small business leaders! Hosted by @AccidentalCISO, produced by @Focivity.
8K Followers 1K FollowingAt Praetorian, our mission is clear: prevent breaches before they happen by emulating real-world attackers. That’s the power of #ContinuousOffensiveSecurity.
288K Followers 4 FollowingThe official @Microsoft account for updates on certain @Microsoft365 service incidents. Get push notifications on our admin app: https://t.co/pGaOsdAblF.
1.1M Followers 21 FollowingLimitless innovation. ☁️ Follow along for the latest news and resources from the official #MicrosoftAzure team. For help, contact @AzureSupport.
8K Followers 686 FollowingMarketing & community leader. Angel investor and cybersecurity advisor. Building https://t.co/ZRGEw2kwDA. Prev VP Hackers at @Hacker0x01
6K Followers 378 FollowingSimplify and clarify • Cybersecurity architecture and strategy • Business + Security Alignment • Make the world better
@markasimos.bsky.social
96K Followers 2K FollowingHacker, marketer. I manage socials and produce amazing technical blogs for cybersecurity orgs. Founder of @hacker_content and @haksecio
2K Followers 1K FollowingRelational therapist for computer systems with a passion for Network Analysis, Protocol Analysis, bug chasing and problem solving. (he/him)
9K Followers 2K FollowingThreat Researcher | Co-Host of Atomics on a Friday | LOLDrivers & Atomic Red Team Maintainer | I'm Everywhere and Nowhere - BSG.
11K Followers 849 FollowingMatt Shadbolt from #Windows365, Ian Bartlett from #MSIntune and George Smpyrakis from the @Microsoft #Azure team. We are the @ConfigMgrDogs