Toots for dreadpir8robots@infosec.exchange account

Shared by Adam Barnett on 2025-01-24 at 19:43 (original by Adam Wilbert)

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2025-01-14 at 18:54 (original by Not Simon 🐐)

=> More informations about this toot | View the thread

Written by Adam Barnett on 2025-01-14 at 18:52

New to me, and interesting: https://www.unpatched.ai/reports

Not a lot of detail on who's behind this, other than they profess alignment with the US and allies.

=> More informations about this toot | View the thread

Written by Adam Barnett on 2025-01-09 at 22:55

Microsoft usually sends out an advanced notification email on the Thursday before Patch Tuesday which hints which products are receiving patches. Not seen one today. I wonder what that means, if anything.

=> More informations about this toot | View the thread

Written by Adam Barnett on 2025-01-07 at 01:21

Reading up on mshta.exe-abusing malware this evening after Defender on the family PC blocked a LummaStealer download.

Proud of my 10yo for telling me immediately that β€œsome Trojan warning popped up”. Initially he was very sad and upset, but we talked through it (β€œyou’re not in trouble!”) and I was impressed to hear his theory that maybe coinminers could be a potential payload. Seriously, he has better infosec opinions than some IT professionals.

We’re also going thrifting for CDs to rip this weekend, because the source of the misadventure was that kiddo wanted MP3s for the new MP3 player, and I reckon now is as good a time as any to learn about ripping and tagging.

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2025-01-02 at 04:08 (original by Not Simon 🐐)

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2024-12-19 at 05:08 (original by Trivial Einstein)

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2024-12-18 at 01:07 (original by Caitlin Condon)

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2024-12-16 at 04:18 (original by DJ Sundog from the new toot-lab)

=> More informations about this toot | View the thread

Written by Adam Barnett on 2024-12-12 at 03:26

A slide from my recent presentation about hackers and malware to a room full of fifth and six graders. No prizes for guessing which attack concept I'm about to introduce.

=> View attached media

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2024-12-11 at 17:28 (original by Kevin Mirsky :donor:)

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2024-12-10 at 18:21 (original by Not Simon 🐐)

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2024-12-09 at 07:21 (original by Mark Gritter)

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2024-12-08 at 00:44 (original by monke)

=> More informations about this toot | View the thread

Written by Adam Barnett on 2024-12-03 at 19:06

Today I explained to a classroom full of 5th/6th graders how bubble sort works. I got them each to write a random number (via dice) on a bit of paper and then picked a student to be the algorithm and run passes over the dataset (the rest of the class). It went surprisingly well.

In a couple of days, I'm going back for another hour, and I'm trying to decide what we should do. We have access to Chromebooks, but there's a wide range of ability/knowledge in the class, so I'd rather not have them hands on keyboard, since this might be off-putting for those who don't have the skills already.

I'm going to do a presentation with like 20-25 minutes of history of computing, and a bit of time on "what is/isn't a hacker?", since they are interested. That bit should come together fairly easily. Don't worry: my slide deck will be heavy on the fun and light on the "ugh PowerPoint".

After that, I have about 30 minutes to fill, and I'm trying to think of something practical for them to do where they're engaged and moving around, a bit like the bubble sort exercise I already came up with and did today.

Suggestions and boost welcome!

=> More informations about this toot | View the thread

Written by Adam Barnett on 2024-12-02 at 15:36

Glad to see Microsoft will be publishing vulnerability management data in CSAF from now on, but the blog post which announces this has strong "I forgot the assignment was due today" energy.

There's no mention of timeline for CVRF retirement, so will Microsoft publish both standards in parallel forever?

No discussion of the advantages of moving to CSAF. Instead, the blog post says that CSAF is an addition rather than a replacement since it's "meant to be consumed by computers", as opposed to the existing CVRF which is published in paperback so you can read it by the pool while sipping a margarita.

Perhaps most confusingly, the blog post claims that "today, we are adding a new standard machine-readable format called Common Security Advisory Framework (CSAF) to all Microsoft CVE information"... but a quick inspection of the CSAF directory shows only a handful of vulns from 2024, and nothing from previous years.

Finally, the "quick nerdy background on CSAF and related things" is certainly quick, but who does MSRC imagine is going to be sitting down to read the MSRC blog but then recoiling in horror because the content is unexpectedly nerdy?

https://msrc.microsoft.com/blog/2024/11/toward-greater-transparency-publishing-machine-readable-csaf-files/

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2024-11-28 at 20:06 (original by Not Simon 🐐)

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2024-11-28 at 20:03 (original by Not Simon 🐐)

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2024-11-28 at 00:14 (original by Tod Beardsley 🀘)

=> More informations about this toot | View the thread

Shared by Adam Barnett on 2024-11-25 at 01:11 (original by h4sh)

=> More informations about this toot | View the thread

=> This profile without reblog | Go to dreadpir8robots@infosec.exchange account

Proxy Information
Original URL
gemini://mastogem.picasoft.net/profile/109295291658646221/reblog
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
439.653845 milliseconds
Gemini-to-HTML Time
4.719151 milliseconds

This content has been proxied by September (3851b).