[-] stevedidwhat_infosec@infosec.pub 109 points 3 months ago

Oh that’s cool, live organ harvesting

Hmm who else has historically done this and was more or less supporting Russia…

Hmmm

[-] stevedidwhat_infosec@infosec.pub 141 points 3 months ago

You know who else did this shit?

Nazis.

[-] stevedidwhat_infosec@infosec.pub 117 points 3 months ago

Captain bummer here:

Most people if this were a guy, would immediately call this out as toxic, manipulative, and abusive behavior

I’ll err on the side of optimism and assume this was just a joke pic, but I did want to shed light on the fact that fucking with your partners food without their knowledge and consent is abusive and manipulative.

[-] stevedidwhat_infosec@infosec.pub 164 points 4 months ago* (last edited 4 months ago)

Tennant: TERFs are whiny fucking babies

JK Rowling, Court Jester: whines like baby

[-] stevedidwhat_infosec@infosec.pub 120 points 4 months ago

Tl;Dr new Linux malware specific to a flavor used by the Indian government uses emojis as a c2 comms path

4

Hey all!

While investigating some malvertising campaigns today, I noticed that one of the sponsored google search results, upon hovering, appeared to be changing/resolving through rather than simply showing what link was being used by the result.

Any ideas as to how this hover url result works and if you can disable resolving/force top-level results upon hovering over anchor elements?

Malvertising is hot hot hot!

[-] stevedidwhat_infosec@infosec.pub 165 points 5 months ago* (last edited 5 months ago)

Please don’t fucking touch anything to do with Linux Musk. Please.

[-] stevedidwhat_infosec@infosec.pub 176 points 5 months ago

LOCK HIM UP

[-] stevedidwhat_infosec@infosec.pub 112 points 5 months ago

Don’t let the media and talking heads convince you of anything.

There are a great majority of people who want nothing to do with Trump, his Russian bootlicking or any of his other xenophobic hate.

Just vote.

[-] stevedidwhat_infosec@infosec.pub 111 points 5 months ago

Here’s probably all the info you could ever need:

https://redcanary.com/blog/threat-intelligence/raspberry-robin/

Next, you need to get your systems scanned and cleaned. Malware bytes is likely enough, but I always recommend BitDefender. Their efficacy rates are always fantastic, and they have been leading the industry for several years now. Download the AV on a clean system, put on clean flash drive, and install that way.

Last, you’re gonna need to reset your passwords. Yes, I know that’s toxic af. But this is the reality and why we always need to be veeeery careful with what we do. This worm communicates with a c2 server which means it can update itself which makes detection hard, and it also means that, at one point it may have been spying on your activity (and it likely was if not continues to)

This stuff happens, don’t beat yourself up too much. Live and learn

[-] stevedidwhat_infosec@infosec.pub 146 points 5 months ago* (last edited 5 months ago)

This is AI, right? So much cursed shit when you zoom in lol

[-] stevedidwhat_infosec@infosec.pub 119 points 6 months ago* (last edited 6 months ago)

The ocean: state of impending catastrophe

Humans: can we make another kind of cheese from them?

6

Hey all, got a quick question!

I want to receive, parse and store syslogs from various devices on my home network on my windows box. I know, I know, its a bit backwards but I'd like to proceed with this sort of setup if possible (not against discussion, of course).

I've looked and looked for options but it seems like everything has been bare bones and basically just receives, or is locked behind premium. Surely there's some sort of solution out there, no? I'd be willing to implement something in Python if I need to but I'm considerably more hesitant when compared to using an open source soln.

Thanks for your time, looking forward to discussing/learning more!

[-] stevedidwhat_infosec@infosec.pub 138 points 11 months ago* (last edited 11 months ago)

Firefox is calling all of you.

We just added a “copy link without trackers” context menu option too ;)

1

Anyone else getting tired of all the click bait articles regarding PoisonGPT, WormGPT, etc without them ever providing any sort of evidence to back up their claims?

They’re always talking about how the models are so good and can write malware but damn near every GPT model I’ve seen can barely write basic code - no shot it’s writing actually valuable malware, not to mention FUD malware as some are claiming.

Thoughts?

view more: next ›

stevedidwhat_infosec

joined 1 year ago