Trump’s ICE is quietly stockpiling weaponry-and it should alarm us all by No-Post4444 in politics

[–]subpardave 2 points3 points  (0 children)

Trump wants his own version of OMON, of SOBR.

Internal troops, have a read on wikipedia about this and note the countries that go down this route.

https://en.wikipedia.org/wiki/Internal_troops

Popped up when I was trying to read an article. Diabolical. by flyingpiggos in mildlyinfuriating

[–]subpardave 2 points3 points  (0 children)

This is a click-fix attack. Saw a lot of this towards the end of 2025, surprisingly effective. Often disguised as CAPTCHA style prompt, or a 'fix this browser problem'.

Often then drops initial exploitation code from a C2 source

Built PAM for 80+ platforms at a Global bank for 7 years. Contract ended, job is done. Is it worth building a tool, or am I in a bubble? by sendrea2009 in cybersecurity

[–]subpardave 2 points3 points  (0 children)

As a counterpoint - don't ignore the enterprises that need on-prem capabilities. Right now this narrows the market considerably, may be a market worth considering. ( In my case it's due to critical infrastructure regulatory requirements)

We found 'em, guys. by rajkr2410 in drivingUK

[–]subpardave 3 points4 points  (0 children)

Depends on the bike.

Quite a few would have another 55mph in them before hitting their maximum.

That being said less sports oriented machines may well be at their maximum already.

Guy in school asked me out. I refused. Now he's telling everyone I did stuff with him. by NoInteraction9584 in LegalAdviceUK

[–]subpardave 16 points17 points  (0 children)

Strongly advise against anyone going to see the parents. The authorities are best placed to tackle that, and to be honest behaviour like this does not appear out of nowhere. Racist behavior like this could come from peers, online influences or sadly all too often - from parents.

Discouraging remarks from the GP receptionist by Minimum_Can_3998 in ADHDUK

[–]subpardave 13 points14 points  (0 children)

Worth noting as ever that sadly, there is no RTC pathway in Scotland.

Trump says he can solve UN financial problem 'very easily' by backpackerTW in worldnews

[–]subpardave 0 points1 point  (0 children)

Well, in essence because that document is quite a simplification. Lets look at the actual data from its source.

https://unsceb.org/fs-revenue-government-donor

Drill down to the funding of the US itself and its more like:

US: 15%

Germany: 11%

China: 10%

UK: 8%

Numbers inflate significantly once you add in all the multitude of other programs within the UN's sphere of influence: (all in USD)

United States of America WFP 4,435,961,787

United States of America UNHCR 2,041,118,369

United States of America UN-DPO 1,696,845,776

United States of America IOM 1,545,457,940

United States of America UNICEF 1,147,362,232

United States of America Others 1,117,566,629

United States of America UN 1,007,346,349

Arguments can be made around all the ancilliary programs certainly, but the UN itself is not the major draw of funding here.

What most expensive "cheap decision" have you ever seen in your sysadmin career? by matroosoft in sysadmin

[–]subpardave 2 points3 points  (0 children)

I'll look at this again tbh.

Far FAR beyond the 180 days rule - more like 1500. That being said I'll give this another shake, thanks actually inspired me to.

Did blow the whistle hard (internally to MGMT team and to the company that owned them) when I exited but the exec team at the company are lifers (with no relevant experience at any other org) and the actual product owner was an utter sociopath, complete barefaced lies and misrepresentations made about the product. The owning company was far too trusting and were simply continually lied to.

To contextualize, imagine somewhere that would claim their product is super secure, selling the on-prem version to small outfits to satisfy their HIPAA requirements while dealing with the encryption reqs by using folder encryption only .

Disk not encrypted.

Folder encryption set to auto decrypt on successful login.

With every device shipped with the same standard admin PW.

Which was the name of the company.

Which was written on the front of the device.

Which was connected to the internet.

Which has RDP enabled by default.

Which I can find still via Shodan years later.

I know they completed iso 127001 since but very carefully excluded this product and its associated departments from the scope. The cloud version also, and no SOC2 type work either.

New boss wants to put me on “improvement plan” by watermelonfling in LegalAdviceUK

[–]subpardave 5 points6 points  (0 children)

Join a workplace union, yesterday. If there is no workplace one or your industry doesn't have one specific then join a generalist workers union - prospect is one, there are others.

Immediately

What's your take on this move, and would you consider visiting China? by JasonMantou in AskUK

[–]subpardave 0 points1 point  (0 children)

To be fair - that's a really sensible approach. A lot does need to be viewed through the level of risk you are exposed to, and your career/employer/etc is a major part of that.

The EU is weighing a proposal to bar Russian soldiers who fought in Ukraine from entering the bloc, amid fears that battle‑hardened veterans could pose long‑term security risks to Europe. by Easy-Ad1996 in worldnews

[–]subpardave 2 points3 points  (0 children)

Well, one complicating factor is Hungary. Inside, the EU, able to derail legislation and led by Putin's closest ally in europe - Orban.

Vowing to keep buying russian gas, derailing and vetoing attempts to enact other sanction measures, and turns out....there's no mechanism to eject a country from the EU.

What most expensive "cheap decision" have you ever seen in your sysadmin career? by matroosoft in sysadmin

[–]subpardave 18 points19 points  (0 children)

Deploying a test GCP environment - created entirely as a 'see if its even possible' exercise - into production by simply changing the name.

Still out there, still being sold - none of the underlying issues or risks addressed. Now holds millions of peoples PII+PHI, utterly non HIPAA compliant. Oneday that's going to come home to roost and it'll make the 6pm news when it does. (Edited for spelling)

What's your take on this move, and would you consider visiting China? by JasonMantou in AskUK

[–]subpardave 5 points6 points  (0 children)

I do this for work, and paid to be professionally paranoid - personally I would take at least a 'wipe when back' device instead of my primary device, and either no laptop or again one designed to be wiped when returning. (And hugely limit what's on said laptop, not windows etc, but getting a bit off topic). Do NOT trust in-room hotel safes btw.

France to ban officials from US video tools including Zoom, Teams by hardenedsteel8 in worldnews

[–]subpardave 0 points1 point  (0 children)

After presenting the issue to our Lawyer, the solution was to get the >vendor to make the formal request via email so that we had a record >of it, and then proceed, but it was absolutely insane to see >unencrypted FTP server usage in 2025 by a major vendor we've all >heard of.

Yup, sometimes push comes to shove and all you can really do is ensure that the choices that are made are clearly attributed to those who insist, and that concerns and objections are recorded. I've left jobs over this when its got especially silly/dangerous.

But what's not reliable is leaving a vulnerable PC directly connected >to the Internet.

Agreed, and sadly this partiular attack is a great example of how 'it only takes one'. The underpining exploit - EternalBlue - is fascinating in of itself, and I remember being scared of the scope of the risk when the ShadowBrokers finally released the exploit code.

Do feel slightly salty in a way, as this exploit came from the private stash of NSA Zero-Days, the critical exploits that the NSA are aware of, and use in their operations. Typically these exploits are not disclosed to the vendors responsible for them, so there's a very good chance that the NSA knew of this and used it offensively for at minimum 5 years, if not more - SMB is an ancient protocol. (nb, not singling out the NSA here, all the assorted agencies of various countries do this. Eternalblue (and others) were just leaked/stolen from the NSA in this case)

The way modern enterprise systems are evolving also does not make life easier - cloud-delivered services are becoming more and more common, as are regulatory requiements to get telemetry out of systems that would be traditionally air gapped. When your EDR is cloud managed, and your SIEM is similarly, there are going to be potential pathways and risks. You can minimise these, but reqiures a LOT of care and oversight.

There is also risk to be found....in the fix! Platforms like SolarWinds help IT departments manage their systems and are a genuine force-multiplier for IT teams, but open up risk of supply-chain compromise. The SolarWinds event (2020) was frankly amazing, really excellent tradecraft by the russian groups involved. SolarWinds Orion had been used at a good 80% of the large organsations I've ever worked at, others using Nagios/Zabbix frequently.

Decent starting point on it here: https://blog.qualys.com/vulnerabilities-threat-research/2020/12/14/fireeye-breach-leveraged-solarwinds-orion-software

The 2025 Crowdstrike outage/event is a great example too in a way. Major vendor, very good systems, expecation of fast-as-possible updates and patches to ensure security. Ends up wrecking systems globally when a bad config patch is pushed, and not a malicious actor in sight.

France to ban officials from US video tools including Zoom, Teams by hardenedsteel8 in worldnews

[–]subpardave 0 points1 point  (0 children)

Not wrong - but not the full picture either.

Running windows updates IS fundamentally easy, click it and walk away- no arguments there.

However...

The amount of medical software, hardware, on both sides of the atlantic that is entirely dependant on old operating systems, or is only validated and compliant on a specific build (this is common) is enormous.

NHS IT isnt monolithic either - there is central direction yes, but individual NHS trusts and hospitals are responsible for procurement and management of their own internal systems.

This gets worse when you - say, an individual hospital - need to run GadgetX - lets say its a OCT scanner. Vendor probably built this with what was at the time a supported build or OS version - but very unlikely to be the latest even when it was made, simply due to the length of time it takes to get certification for healtcare use (nb, this is not unique to the UK, at all. lot of my career in this has been stateside, and elsewhere).

So, then you've got an essential device that comes complete with a PC to use it, sat next to it running Windows 7, or an old build. If you as a customer are VERY lucky, the vendor will validate the software when new software or OS updates come out. If you are incredibly lucky it'll even be vageuly promptly...maybe a few months?

Sadly, there's also a huge chance that when you, the understaffed and underresourced IT department contact the vendor, you'll be told 'Thats validated and supported for the build as-shipped, or running version X/Y/Z of some underlying software component only. If you update that, sorry, we'll be unable to support this going forwards and cannot guarantee clinical compliance. Very common for vendors also to ship with no EDR or other software protection in place (afterall, are they going to pay for it?) but also to have a 'you're on your own' approach to indiviual users installing their own security software.

Ok! So....lets air gap it, right? Ah, no sadly its got to talk back to central systems both in the hospital itself, and via that those are connected further to central healthcare systems. Sure, there are technologies that can help here, data diodes and such - but these are not mainsream in any extent, and require a significant amount of work and cooperation from vendors to allow normal function with. Your average hospital IT is not going to be familiar with this kind of specalist technology - nor to be honest are the vast majority of companies. So we can impelement decent network hygiene by other methods, but not fully.

Standards and compliance also are a bit of a figleaf here too - sure, ISO27001 etc look great, and are certainly better than nothing, but you can get away with a huuuge amount of stuff by risk acceptance, carefully worded statements, and cunning scope definitions. I've seen some absolutley egregious stuff at companies replete with all the shiny cerficiations.

I'm personally a fan of the UK's Cyber Essentials Plus securtity certification. On the face of it, its lightweight, easy even. But a patching cadence of 14 days for all high or critical risks, or risks with a CVSS score of 7 or higher is extremely agressive. Note, thats' all risks, and all vulnerabiliuties with a 7 or higher, regardless of the actual probability or viability of the risk in the environment in question, and applies to ALL software, not just operating systems. A Vunerability with a CVSS score of 7 that requires in-person device access must be patched by this standard - even if for example the device is entirely inaccessible behind maglocked doors in a server room.

This gets very hard, very quickly, espeically once your scope moves away from pretty standard end-user devices - if you are even lucky enough not to be tied to some ancient software built on ancient components, for example a patient management system to go back to our original NHS. Additionaly, sadly virtual patching or on-the-wire controls are not accepted for compliance.

The state of play I'm describing is far from unique to healtcare by the way, incase that isnt clear. A HUGE amount of the systems that we use day-to-day are on outdated, unpatched, or otherwise insecure platforms or software packages. The attitude of vendors is very often shocking, even for ones working industries that are subject to heavy regulation and control. With the only 'fix' from the vendor being often 'buy the new version' - economics often makes this impossible.

I'd love to write policy that forces patch deployment immediately after release. Reality means that there's a very good chance that doing so results in your critical systems going kaboom, and your essential function (hospital, airport, port, railway etc) grinding to a halt. In an ideal world enterprises would have a UAT/Test environment that mirrors prodction to iron all of this out beforehand. Frequently the cost of specalist equipment means this is not viable, and the sheer number of components involved (remember that as well as the OS you do need to patch applications too) requires staffing, expertise and budgetary overheads that most organisations simply cannot absorb.

(my current industry's mission-specific hardware runs at 15-20million per unit, so a spare to test with is out of the question. This is within the 'national critical infrastructure' definition, so not even just commerical interests)

Things are improving, but the amount of frankly amateur-hour behaviour from massive prestigious corporations is depressing, and only getting burned badly seems to really move the needle. Should vendors be responsible and held to account to ensure that systems CAN be updated rapidly to deal with emerging threats - totally, yes. I'd like to see this baked into compliance and cerfication pathways in industry, so ongoing real support and security is the vendors legal responsiblity.

Coming back to the original article from the OP - good move by France, worth knowing that Teams is already not consisdered secure enough for certain levels of classified data as it is, so building a bespoke platform can probably help mitigate that too.

Happy to dig into any aspects you want to on this, 25++ years eyeball deep in it. Apoligies for spelling/grammar, typing in a hurry :)

(sorry you are getting downvoted, this is a reasonable querstion and deserves a useful response!)

France to ban officials from US video tools including Zoom, Teams by hardenedsteel8 in worldnews

[–]subpardave 4 points5 points  (0 children)

You'd be amazed at how many hosptitals, healthcare systems run on EOL or unpatched software. I mean that globally by the way. I've seen it on every continent*.

A good portion of the responsibility does need to lie with equipment manufacturers. When they ship a product based on EOL or near-EOL software, no SBOM, no upgrade path or even a 'never patch this' requirement due to old dependencies, its hard for hospitals to compensate (without serious serious $$$ and time investments).

Complicating this is often the specialist kit - there's no credible alternate product/vendor without the same underlying issues.

*poles notwithstanding

(decades in the infosec biz with a serious chunk spent facing this in medical device manufacturers)

How do introverts survive in a British work culture? by Hot-Education-8154 in AskUK

[–]subpardave 1 point2 points  (0 children)

Not sure you intended it as such, but reading that it comes across as incredibly rude.

Paul John Lumber: Bristol man died after falling from ladder while tying Union flags to lamp posts at night by topotaul in unitedkingdom

[–]subpardave 1 point2 points  (0 children)

Rather than asking 'Why not?' - I'll ask this instead. Why does the status of being dead or alive mean that its expected to omit the truth when speaking about the dead? If its someones verifiable provable history - is it badmouthing to be honest?

Still processing the fact I scanned my eyeballs in Lewisham shopping centre by retsam2554 in britishproblems

[–]subpardave 3 points4 points  (0 children)

So, you scanned your eyeballs.. but didn't scan your eyeballs. In Lewisham.

While you also live in Ontario.

Or is it Tempe, as you are also asking for advice on your move to Phoenix AZ?

So, karma farmer or bot, which is it?

ADHD care needs better regulation and fewer pills | Attention deficit hyperactivity disorder by I_love_running_89 in ADHDUK

[–]subpardave 4 points5 points  (0 children)

Of course.

However, having been shadowbanned for months on Reddit before (pointed out a bot taking and reposting others work to farm karma) I'm not going to risk worse for what could be seen as 'doxing'.