Strat 🌐 (@strat) 's Twitter Profile
Strat 🌐

@strat

Hacker. Entrepreneur. Builder of teams. Cyber is a prefix, not a noun. Pet peeve: dormant research IP. RT!=assent. Not a cryptocurrency.

ID: 1490191

calendar_today19-03-2007 10:58:12

4,4K Tweet

1,1K Takipçi

1,1K Takip Edilen

NCSC (@ncscgov) 's Twitter Profile Photo

Foreign intelligence services routinely target people online by posing as head-hunters, consultants, government officials, academics, and researchers. Here's what an actual Direct Message approach looks like, courtesy of the Australian Security Intelligence Organization.

Foreign intelligence services routinely target people online by posing as head-hunters, consultants, government officials, academics, and researchers.  Here's what an actual Direct Message approach looks like, courtesy of  the Australian Security Intelligence Organization.
Troy Hunt (@troyhunt) 's Twitter Profile Photo

Data breach at The Club Penguin Experience. Let me take a moment to point out what an awesome job these folks have done with their disclosure: 1. They sent this out the same week as the breach occurred 2. They say exactly what happened and what was exposed 3. They say “hash” and

Data breach at The Club Penguin Experience. Let me take a moment to point out what an awesome job these folks have done with their disclosure:

1. They sent this out the same week as the breach occurred
2. They say exactly what happened and what was exposed
3. They say “hash” and
JD Work (@hostilespectrum) 's Twitter Profile Photo

It bears repeating. SALT TYPHOON, like AURORA PANDA before, should shatter any illusion that warranted access technologies implemented by simple administrative processing will remain in any way NOBUS over the lifetime of their deployment. This breaks LE assumptions inherited

Today in Tech History (@daytechhistory) 's Twitter Profile Photo

On this day in 1987, a pirate television signal was broadcasted to thousands of Chicago-area TV sets tuned to WGN and WTTW. The event became known as the Max Headroom Incident, and the people responsible for it remain unidentified.

On this day in 1987, a pirate television signal was broadcasted to thousands of Chicago-area TV sets tuned to WGN and WTTW. The event became known as the Max Headroom Incident, and the people responsible for it remain unidentified.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

2010: Matt Blaze published the PowerPoint slides he was contractually required to submit for his 2011 RSA Security Conference presentation. Matt hates PowerPoint. Take a moment to admire the slides he submitted. 🤣🏆

2010: Matt Blaze published the PowerPoint slides he was contractually required to submit for his 2011 RSA Security Conference presentation. Matt hates PowerPoint. Take a moment to admire the slides he submitted. 🤣🏆
vx-underground (@vxunderground) 's Twitter Profile Photo

.Simo did the math. Here is a list of every vendor and every high-severity CVE from the past 5 years. Qualcomm: 97,388 Cisco: 15,833 Microsoft: 11,375 Intel: 9,323 Juniper: 5,550 Dell: 5,041 Hp: 4,448 Netgear: 3,855 Apple: 3,544 Siemens: 3,281 Zoho Corp: 2,636 Lexmark:

ARRL (@arrl) 's Twitter Profile Photo

[ARRL News] How to Let Kids Talk with Santa Over Ham Radio This Holiday Season ow.ly/Et8n105Q3Ix #ARRL #amateurradio #hamradio

Strat 🌐 (@strat) 's Twitter Profile Photo

QST Best wishes to Grimeton Radio/SAQ & congratulations on the centennial of the Alexanderson Alternator = TNX for preserving communications history & sharing with us = FB 73 #AlexanderSAQ #radiohistory

Strat 🌐 (@strat) 's Twitter Profile Photo

From the perspective of a pilot, I am not as concerned about the activity as I am the fact that it is occurring right before H.R. 8610 comes up for a vote.

Jake Williams (@malwarejake) 's Twitter Profile Photo

This is your reminder that Exchange on-prem has effectively been put out to pasture by Microsoft and if you're continuing to use it, you're accepting a huge amount of risk. You don't have to like it, but if you care about security, M365 is the way.

solst/ICE (@icesolst) 's Twitter Profile Photo

I was in a redteam bubble for over a decade. All we talked about was popping shells, getting domain admin, and how trash every company’s security was. When I moved to the blue team and ultimately went into leadership, I realized there was so much more to security than breaking

LaurieWired (@lauriewired) 's Twitter Profile Photo

Backblaze just published their 2024 HardDrive Failure report. Takeaways: - 16TB drives looking very reliable (may be a “low bathtub curve” artifact) - HGST no longer king of stability. (WD acquisition hurting quality?) - Toshiba looking good for lack of outliers.

Backblaze just published their 2024 HardDrive Failure report.

Takeaways:
- 16TB drives looking very reliable
(may be a “low bathtub curve” artifact)

- HGST no longer king of stability.
(WD acquisition hurting quality?)

- Toshiba looking good for lack of outliers.
Dino A. Dai Zovi (@dinodaizovi) 's Twitter Profile Photo

It's a never-ending source of mystery to me how orgs that see security in terms of selecting which commodity products to buy expect to defend against advanced attackers that show up with custom tooling and exploits. If the product isn't export-controlled, how good is it really?

Dave Kennedy (@hackingdave) 's Twitter Profile Photo

😳😬 This reminds me of a time I was doing an interview on CNN, there was a retired FBI agent arguing why law enforcement needs weakened encryption and backdoors in these devices to fight crime. I was obviously the counterpoint to this in that weakening security and privacy is

Tavis Ormandy (@taviso) 's Twitter Profile Photo

You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. bughunters.google.com/blog/542484235…

ARRL (@arrl) 's Twitter Profile Photo

[ARRL News] World Amateur Radio Day – International Amateur Radio Union Formed 100 Years Ago ow.ly/Lc5q1066gcO #ARRL #amateurradio #hamradio

LaurieWired (@lauriewired) 's Twitter Profile Photo

DON’T vibecode sysadmin type tasks lol configuring some network switches, I woke up to a reimplementation (???) of SSH in python

DON’T vibecode sysadmin type tasks lol
 
configuring some network switches, I woke up to a reimplementation (???) of SSH in python