Show newer

It's a most wonderful time of the year: CSC9 conference. It's been virtual last year, good to be back in person. Also nice opportunity to earn some CPE.

If you run GitLab you probably want to update your servers ASAP. Looks like things being exploited and turned into botnet to launch DDoS attacks. therecord.media/gitlab-servers

For those who follows development around CMMC model it seems there are some very significant changes coming with 2.0 version. Those of us who has been in software development long enough would feel dejavu moment and certainly recall Angular 2.0 release. Here is the link you can start your deciphering journey acq.osd.mil/cmmc/assessments.h

October Update:

Introducing the #PinePhonePro - $399

#PineNote and PinePhone Pro pre-orders are now open to developers & shipping this year!

#PineTime #InfiniTime major firmware progress & project management update

pine64.org/2021/10/15/october-

Security is a complex exercise, and there could not be any rush in protecting sensitive data. Aside of fact that vaccine passports are infringement on people freedom, governments should have asked themselves is this information that can be handled by startup. Unfortunately we see an opposite, governments around the world buying those type of apps from startups who are in gold rush mode to deliver, because window of opportunity to get their hands on budget money is short.
blog.malwarebytes.com/privacy-

Cloud providers came together with set of Trusted Cloud Principles. You may ask what's wrong with this, looks like really nice initiative. However if you look closer, it's skewed towards cloud providers ability to access/store your data. One very important piece is missing in that initiative is ethical behavior of those providers and equal opportunities for legal expression. In other words there is nothing about those providers censoring you when you view is different. trustedcloudprinciples.com/

Another day another rootkit. There was an interesting exploit made public couple days ago, that allows attacker to stay hidden from view point of Windows subsystems in charge of security while having quite a bit of an access to that PC and of course company that identified ability to exploit offering their services to protect PC's ... quite suspicious ... thehackernews.com/2021/09/a-ne

@kyle Entirely agree, vendors doesn't want for their users to make right choices, otherwise when users would be able to leave vendors when they are not delivering and then who is going to pay for those jails. So each of those vendors want their users to stay and pay for their jail, looks like upside down world to me.

If anyone still had an illusion that social media platforms are about purpose, social good, here is article for you. They only care about ways to exploit networking effect for as long as it increases their bottom line, thus people with large audience, politicians and etc are exempts from rules defined by platforms. Rules are for regular people and people are just a product being packaged and sold to advertisers. Ethiork helps you break free of those giants. wsj.com/articles/facebook-file

Microsoft disclosed Zero-Day vulnerability 2 days ago about remote code execution that is exploited through specially crafted MS Office documents. Please be careful and better refrain from opening any docs from untrusted sources. It sounds like actively exploited targeted attack. msrc.microsoft.com/update-guid

I've been a fan of #Mycroft for a while now, but I recently learned some things they're involved with that I was completely unaware of. Maybe that's my fault for not paying attention, or maybe they could use some help in the PR department.

They've scored a contract with #NASA for various "space" related projects which sound interesting.

bizjournals.com/kansascity/new

They've been working with Tree Industries on #Ezra EA to develop voice technologies for classrooms.

tree.industries/products/ezra/

Finally got around reducing resolution of the images on my blog and submitting it to 512kb.club/ doing my part in reducing digital waste on the Internet. Check it out here sergeysh.com/

@kev Looks awesome, I would have done networking closet first :D

Security poverty line. Many organizations fell behind it with more sophisticated threat actors out there. However organizations can buy their way out of it with more investments. What about individual consumers? Are the products that suitable for consumers? Are they stuck with big tech companies and their "free" products. That's why we started Ethiork project, to give individuals a hand to raise above security poverty line. ethiork.com/

Holidays are usually sweet spot for threat actors, because it's easy to go undetected over extended holidays. There is no sleep people involved in cybersecurity :( here is advisory from CISA and FBI us-cert.cisa.gov/ncas/alerts/a

Product leaders today often met with a dilemma: what are those values you will never compromise on, even if that would cost you a job. I would say ethics should be one of those values, without ethics you but going to be able to build fruitful product or company.

... accidental typo in nmap scan leads to scanning of majority of network infrastructure, which leads to finding some unexpected ports on several host, which leads to a witch hunt unleashing wide variety of tools on to those hosts ... just to confirm that everything runs as expected ... as a result all tools on offensive security box has gotten most recent updates and skills brushed off ...

Show older
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!