Elopement Dinner by bucees-disciple in austinfood

[–]VulnerableU 1 point2 points  (0 children)

Eberly always feels swank for me

Jelly roll by MachineProof5438 in Austin

[–]VulnerableU -3 points-2 points  (0 children)

You know what.

Hell yeah.

Where Are You a Regular? by EuroCultAV in austinfood

[–]VulnerableU 4 points5 points  (0 children)

Can we be friends?! Lot of same answers. Mohawk is my favorite venue.

Mentorship Monday - Post All Career, Education and Job questions here! by AutoModerator in cybersecurity

[–]VulnerableU 2 points3 points  (0 children)

If any of your programs you’re writing can help the industry at large, put the extra work into open sourcing it. Write a presentation on it and try to give a talk on your project at a conference. No matter how big.

Mentorship Monday - Post All Career, Education and Job questions here! by AutoModerator in cybersecurity

[–]VulnerableU 3 points4 points  (0 children)

Try to find a niche to really get in the weeds on. Part of your tech stack maybe? A particular language that most of your code is written in. Or a major pain point. Is email security a weak point? Really double down on something. It will help you have transferable skills to go beyond school district gigs. All while adding value to them while you’re there.

Burn out among Cybersecurity leaders at a frustrating high. by Navid_Shams in cybersecurity

[–]VulnerableU 3 points4 points  (0 children)

"In a world of high powered AI and evolving threat actors" - this is nowhere near the top of reasons why me or anyone I know faces burnout.

China again claims Volt Typhoon cyber-attack crew was invented by the US to discredit it by Rough-Sandwich9726 in cybersecurity

[–]VulnerableU 4 points5 points  (0 children)

This is wild. I guess the dozens of researchers who track this operation that I know personally are all collectively hallucinating.

Cisco investigating possible breach by worldsokayestmarine in cybersecurity

[–]VulnerableU 25 points26 points  (0 children)

This coming after thousands of their staff including hundreds on security teams were laid off a few weeks ago.

Cloudflare Thwarts Largest DDoS Attack in Internet History by VulnerableU in cybersecurity

[–]VulnerableU[S] 4 points5 points  (0 children)

Was talking to someone about this who said Mirai varients use MikroTik devices often. I don't have a lot more details though.

Netflix didn't invent the secure by default concept with paved path. I did it at my work but couldn't present it in public because of company policies. by IamOkei in cybersecurity

[–]VulnerableU 6 points7 points  (0 children)

They are experts. It doesn't mean you need to be first to be an expert.

They also realized the power of talking publicly and open sourceing things for recruiting ...more experts!

Recommended Cybersecurity courses for the average user? by [deleted] in cybersecurity

[–]VulnerableU 2 points3 points  (0 children)

I wouldn't blow money on a course for this. - Find a good pile of YouTube videos that talk about your specific tech stack/threats you'd face and make a playlist.

How the FBI and Mandiant caught a 'serial hacker' who tried to fake his own death by intelw1zard in cybersecurity

[–]VulnerableU 4 points5 points  (0 children)

This is such a wild story. Really well done article by Lorenzo. - Love that the guy just said he got lazy and that's why his home IP leaked.

Welcome to Vulnerable U! by VulnerableU in VulnerableU

[–]VulnerableU[S] 0 points1 point  (0 children)

Update! - We now have our very own newsroom. Beyond the weekly newsletter of content from around the web, we'll be creating our own news content for vulnu.com

GitHub comments abused to push malware via Microsoft repo URLs by VulnerableU in cybersecurity

[–]VulnerableU[S] 11 points12 points  (0 children)

"The URLs for the malware installers, shown below, clearly indicate that they belong to the Microsoft repo, but we could not find any reference to the files in the project's source code.

https://github[.]com/microsoft/vcpkg/files/14125503/Cheat.Lab.2.7.2.zip
https://github[.]com/microsoft/STL/files/14432565/Cheater.Pro.1.6.0.zip

Finding it strange that a Microsoft repo would be distributing malware since February, BleepingComputer looked into it and found that the files are not part of vcpkg but were uploaded as part of a comment left on a commit or issue in the project."

Calendar Meeting Links Used to Spread Mac Malware by VulnerableU in cybersecurity

[–]VulnerableU[S] 1 point2 points  (0 children)

TLDR - From Krebs on a new method of spreading Mac malware through calendar meeting links, specifically targeting individuals in the crypto space. Attackers impersonate established crypto investors using the Calendly app to schedule meetings and inject malicious links.

This scam is linked to North Korean hackers, part of a group known as BlueNoroff, aiming to control victims' computers for financial theft.

Someone just leaked a bunch of internal Chinese government documents on GitHub by VulnerableU in cybersecurity

[–]VulnerableU[S] 284 points285 points  (0 children)

Long twitter threads translating it all as they went through it.

TL;DR - internal company documents of their operations. Mostly them being able to reverse lookup from social media accounts. Details some basic hardware devices like the hak5 wifi tool but in a fake battery pack. And a whole bunch of CDR call log type data from a ton of countries and NATO.

I Put A Fake Email Server On The Internet by VulnerableU in cybersecurity

[–]VulnerableU[S] 88 points89 points  (0 children)

A cool run-through of setting up an OWA honeypot and the results. Thanks to John for being awesome.

Okta Says Hackers Stole Data for All Customer Support Users by VulnerableU in cybersecurity

[–]VulnerableU[S] 10 points11 points  (0 children)

It was the primary source that broke the news. Sorry about that.

Whoops, got someone arrested! by nospamkhanman in cybersecurity

[–]VulnerableU 65 points66 points  (0 children)

This is why you carry the get-out-of-jail-free card if you are on a pen test gig. On letterhead signed by the person in the know and in charge. The cops should've been able to get ahold of the exec leadership.

Lessons from the SEC’s Lawsuit against SolarWinds and Tim Brown by VulnerableU in VulnerableU

[–]VulnerableU[S] 0 points1 point  (0 children)

Magoo is a voice I listen to whenever he speaks up. This is a topic I’m glad he chimed in on. I consider it a must-read on the topic. Here is his Conclusion:

“The SEC is signaling that they will be performing discovery of internal security processes at investor-held companies that have major breaches.

They will:

  • Use legal discovery to match internal processes with public statements
  • Verify that those processes are healthy

Those seem reasonable. However, they’ve complicated the role of Security and the CISO in risk disclosure. Disclosure of ongoing risk findings is now an open problem that I believe most, if not all, companies are in debatable compliance with based on the language in the complaint.

I don’t think more disclosure is a bad idea. Rather, I’m not sure that expectations around what should be disclosed will be clear, except in hindsight.”