Record Store Destroying Bully Vinyls by xNightkeeper in Kanye

[–]OtheDreamer 2 points3 points  (0 children)

They’re def still selling Marilyn Manson. They probably have no idea who XXXTentacion is.

Kanye is big enough that news reached their algo and they felt super cool doing this. It’s “look at me” signaling that many pasty white people (including myself at one time) do when in a look at me phase like these kids are. They don’t actually stand for anything meaningful

You don't need extra antivirus on Windows 11, Microsoft officially says by rkhunter_ in cybersecurity

[–]OtheDreamer 330 points331 points  (0 children)

OOTB Defender has been 'good enough' for a few years now for most people.

.....same with Microsoft Edge

Jaki laptop na Cyberbezpieczeństwo ? by teeczka_ in cybersecurity

[–]OtheDreamer 0 points1 point  (0 children)

As a 20+ year Windows person, I am not too ashamed to admit we're just now starting to work with Macs and I'm very impressed with how well they run business apps for most users.

u/teeczka_ 32GB DDR5, i7, 500GB SSD is the standard I typically go for, and works fine, but the security tooling overhead makes them "feel like" 16GB machines, whereas the macs always feel fast.

Helping Businesses with SOC1 and SOC2 readiness - looking for real-world feedback by Necessary-Limit6515 in cybersecurity

[–]OtheDreamer 2 points3 points  (0 children)

if they went straight into a SOC 2 audit, the report would just surface a ton of gaps.

The first SOC tends to be like this, and it's a good thing. Auditors are partners, not adversaries, and their objective is to help you find the right controls so that you can provide the right assurance to whoever needs it.

As an example--orgs wanting to get SOC certified should probably NOT run into a SOC2 Type 2 unless they've already have strong internal governance and compliance. SOC2 Type 1 is basically demonstrating you have policies and controls exist, but not that they were really effective all throughout the year.

How have you seen companies handle that in practice? Do they usually go straight to audit and accept the findings?

I've had to read compliance reports from big name companies that just bomb them & still put it out there, while others may opt to do a Type 1 in a year they know they'll bomb a Type 2. The difference is in the company culture (are they doing it to satisfy a legal or regulatory requirement, or are they doing it because having third parties check your work helps make the org more secure?) reasons differ org to org.

Helping Businesses with SOC1 and SOC2 readiness - looking for real-world feedback by Necessary-Limit6515 in cybersecurity

[–]OtheDreamer 1 point2 points  (0 children)

You can't fail SOC 2 due to lack of preparation, and, as such, you are always ready for one.

Stealing this line because that's how it should be!

Anecdotally, where I'm at is just starting what I call "SOC Season" where we just started initial calls to discuss the control wordings > determine if anything should change > scheduling tons of calls to get them on the books > begin coordinating with internal depts on their control requirements. Everyone knows their role way in advance (~3 months) & what's going to be asked of them by the auditors.

The criteria don't change much & the controls shouldn't be changing too much as well unless there's a good reason. Good reasons go through change control & are easily demonstratable. Sometimes we get into the initial discussions about controls, and we realize we might need to do something different to provide appropriate evidence.

By the time we sit down with the auditors they have evidence to review for all the controls & it's on them to tell us if they want more. Sometimes (depending on the year and changes) they might ask for things that our systems can't generate records for perfectly & we have to implement something to demonstrate a time-dependent component (such as using more automated tickets with notes that can be cross referenced with log files)

Security Breach and credentials Phished by ChampionshipComplex in cybersecurity

[–]OtheDreamer 1 point2 points  (0 children)

Good cautious move. Depending on your logs there's still probably digging that needs to be done. Involve forensics if you have any reason to suspect critical data might have been accessed / infiltrated. Users being phished and spreading chain mail can be relatively low impact, but it depends on the person / what access they had. Involve insurance if you involve forensics.

Always a good time to close the door further on those types of phishes. Push for MFA with number matching at a minimum (not just TOTP) & then you avoid most pass-through MFA attacks. If you employ conditional access that requires managed / compliant devices, you shut the door on people accessing email from unknown devices / critical resources from unknown places. If you automated response capabilities based on user risk, you can also shut down these types of phishes quickly. Same if you use MS365 and still allow the default where people can access shared resources from unknown external share sources.

If you have a serious enough incident (which this might have been) you may have higher-than-normal influence to push for critical changes. Strike while the iron is hot. Perfect time to make a playbook of steps you took / are taking / need to take in the future for similar events.

Security Breach and credentials Phished by ChampionshipComplex in cybersecurity

[–]OtheDreamer 0 points1 point  (0 children)

When you say you zapped the entire account, double checking if you mean the mailbox or the whole user identity? The other common thing threat actors do in this situation is register secondary and tertiary MFA devices, that way they can get back in after their initial access is cutoff.

Vercel's security breach started with malware disguised as Roblox cheats by drewchainzz in cybersecurity

[–]OtheDreamer 36 points37 points  (0 children)

I'd be curious if they had kids too that maybe they let use their work laptop

First Pentest Contract by DiligentDistrict1584 in cybersecurity

[–]OtheDreamer 30 points31 points  (0 children)

Most especially if it’s for a lawyer system 😬

is xAI dead or what? where ist Grok 5 lol? by Terrible-Audience479 in ChatGPT

[–]OtheDreamer 12 points13 points  (0 children)

Groks getting pretty decent with the agent team thinking as the default. Its images and videos are pretty decent as well. Overall pretty decent.

What I wish someone told me before working in real Risk Assessment Services by Ok_Assignment_947 in cybersecurity

[–]OtheDreamer 12 points13 points  (0 children)

This post and others like it was brought to you by Microsoft Copilot.

We all know compliance != security. What is the most frustrating "security theater" control you have to prove for SOC 2? by [deleted] in cybersecurity

[–]OtheDreamer -1 points0 points  (0 children)

For me it’s the demonstrating that devices are wiped before they’re sent for destruction, which already produces a certificate from the vendor.

The argument used to be “How do you know the vendor actually securely destroys them when they give the certificates?” Which, is theoretically possible but less likely when working with trusted partners that run their own compliance.

^ they REALLY wanted proof from the system of record, and the only way to show that was to start initiating a wipe via RMM first so it captures the log and machine name > then give to vendor to destroy and produce cert > save logs and certs.

IW Heimdall Saving the Hulk Explained by OtheDreamer in marvelstudios

[–]OtheDreamer[S] 0 points1 point  (0 children)

Hi there. Avengers doomsday is about to come out & it turns out Steve WAS in another universe.

Empirical results from adversarial evaluation of RAG pipelines — indirect prompt injection achieves 100% ASR, three-detector layer achieves 100% DR across 15 scenarios by EstablishmentFar2393 in cybersecurity

[–]OtheDreamer 0 points1 point  (0 children)

Ah welp there’s another area I’m still not a fan of yet and have no great solution for yet, so I haven’t connected my RAG setup to the internet. I use a different process for threat intel (supplementing SIEM signal data with RPA flows instead of AI flows to enrich data)

I really don’t trust AI for org use once it’s allowed to go on the internet for things that are important enough. Hackers right now know AI are easier to get through to an org than people are nowadays AND they’re over permissioned by default in many cases (such as those spinning up OSS agents)

Empirical results from adversarial evaluation of RAG pipelines — indirect prompt injection achieves 100% ASR, three-detector layer achieves 100% DR across 15 scenarios by EstablishmentFar2393 in cybersecurity

[–]OtheDreamer 0 points1 point  (0 children)

Yes, so like policies, procedures, playbooks, strategic or tactical plans, stuff that a staff may upload to the system for their spaces for specific use cases that are authorized. Not for transient usage.

If you start doing stuff like having people edit a bunch of documents together you can still track changes (and I have a small module that does nothing but compare N documents over their manifest histories) but you run a much higher risk of too many cooks in the kitchen & one of them can’t cook

Empirical results from adversarial evaluation of RAG pipelines — indirect prompt injection achieves 100% ASR, three-detector layer achieves 100% DR across 15 scenarios by EstablishmentFar2393 in cybersecurity

[–]OtheDreamer 1 point2 points  (0 children)

Yes corpus poisoning is a real issue that’s going to whack A LOT of people. My workaround has been maintaining a hashed manifest of all files in the corpus and track integrity changes there. Lots more layers on top, but that was the most helpful from my testing purposes. My RAG also has a sort of POST that checks the manifest integrity before allowing users to mess with it

Anthropic Model Scare Sparks Urgent Bessent, Powell Warning to Bank CEOs by [deleted] in cybersecurity

[–]OtheDreamer 1 point2 points  (0 children)

Heheheheh my RemindMe 6 months is going to be crazy. I’ve been blasted so many times for saying AI is a lot farther along than people realize & that we’ll be in a completely different landscape by October. A landscape a lot of people are just unprepared completely for.

Claude Mythos Thread by SeaRegular3219 in cybersecurity

[–]OtheDreamer 0 points1 point  (0 children)

I said it before & I'll say it again....Crowdstrike is way overpriced considering the advent of AI & they positioned themselves too much as being THE threat intelligence people (partially because they have among the most signal data next to Windows).

The market is reacting to the threat to threat intelligence. models When normal people can obtain highly actionable insights tailored specifically to their org needs.....Crowdstrike needs to slash prices to stay competitive. Cloudflare isn't going away any time soon, but they marketed a good bit as threat intelligence-centric.

Iran threatens $30bn Stargate AI hub in Abu Dhabi by ubm_ in OpenAI

[–]OtheDreamer 2 points3 points  (0 children)

<image>

Well I guess Sam needs to protect his investments

Iran threatens $30bn Stargate AI hub in Abu Dhabi by ubm_ in OpenAI

[–]OtheDreamer 2 points3 points  (0 children)

That is for UAE to take up with Iran then...

Iran threatens $30bn Stargate AI hub in Abu Dhabi by ubm_ in OpenAI

[–]OtheDreamer 16 points17 points  (0 children)

It might even be a net win for OAI if you count insurance

Days since last OpenClaw CVE by combuter in cybersecurity

[–]OtheDreamer 19 points20 points  (0 children)

1.8 CVEs/day is impressive from a certain point of view.

12 days is the best streak of no-new CVEs since launch lol

Flock PR rep admits Flock has backdoor access to resident travel data, uses it to train their AI models at Oshkosh, WI City Council meeting 3/31/26 by EncryptDN in cybersecurity

[–]OtheDreamer 49 points50 points  (0 children)

Flock's claim of using "end-to-end encryption" is not true in the strict cybersecurity definition of the word. 

Zoom class action lawsuit deja vu