=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
New to me, and interesting: https://www.unpatched.ai/reports
Not a lot of detail on who's behind this, other than they profess alignment with the US and allies.
=> More informations about this toot | View the thread
Microsoft usually sends out an advanced notification email on the Thursday before Patch Tuesday which hints which products are receiving patches. Not seen one today. I wonder what that means, if anything.
=> More informations about this toot | View the thread
Reading up on mshta.exe-abusing malware this evening after Defender on the family PC blocked a LummaStealer download.
Proud of my 10yo for telling me immediately that βsome Trojan warning popped upβ. Initially he was very sad and upset, but we talked through it (βyouβre not in trouble!β) and I was impressed to hear his theory that maybe coinminers could be a potential payload. Seriously, he has better infosec opinions than some IT professionals.
Weβre also going thrifting for CDs to rip this weekend, because the source of the misadventure was that kiddo wanted MP3s for the new MP3 player, and I reckon now is as good a time as any to learn about ripping and tagging.
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
A slide from my recent presentation about hackers and malware to a room full of fifth and six graders. No prizes for guessing which attack concept I'm about to introduce.
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
Today I explained to a classroom full of 5th/6th graders how bubble sort works. I got them each to write a random number (via dice) on a bit of paper and then picked a student to be the algorithm and run passes over the dataset (the rest of the class). It went surprisingly well.
In a couple of days, I'm going back for another hour, and I'm trying to decide what we should do. We have access to Chromebooks, but there's a wide range of ability/knowledge in the class, so I'd rather not have them hands on keyboard, since this might be off-putting for those who don't have the skills already.
I'm going to do a presentation with like 20-25 minutes of history of computing, and a bit of time on "what is/isn't a hacker?", since they are interested. That bit should come together fairly easily. Don't worry: my slide deck will be heavy on the fun and light on the "ugh PowerPoint".
After that, I have about 30 minutes to fill, and I'm trying to think of something practical for them to do where they're engaged and moving around, a bit like the bubble sort exercise I already came up with and did today.
Suggestions and boost welcome!
=> More informations about this toot | View the thread
Glad to see Microsoft will be publishing vulnerability management data in CSAF from now on, but the blog post which announces this has strong "I forgot the assignment was due today" energy.
There's no mention of timeline for CVRF retirement, so will Microsoft publish both standards in parallel forever?
No discussion of the advantages of moving to CSAF. Instead, the blog post says that CSAF is an addition rather than a replacement since it's "meant to be consumed by computers", as opposed to the existing CVRF which is published in paperback so you can read it by the pool while sipping a margarita.
Perhaps most confusingly, the blog post claims that "today, we are adding a new standard machine-readable format called Common Security Advisory Framework (CSAF) to all Microsoft CVE information"... but a quick inspection of the CSAF directory shows only a handful of vulns from 2024, and nothing from previous years.
Finally, the "quick nerdy background on CSAF and related things" is certainly quick, but who does MSRC imagine is going to be sitting down to read the MSRC blog but then recoiling in horror because the content is unexpectedly nerdy?
https://msrc.microsoft.com/blog/2024/11/toward-greater-transparency-publishing-machine-readable-csaf-files/
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> This profile without reblog | Go to dreadpir8robots@infosec.exchange account This content has been proxied by September (3851b).Proxy Information
text/gemini