News by huxley@infosec.exchange
lade... random avatar 🔔 Follow Folgen

huxley - Network

Posts Subscribe

Representational parity is a continuing struggle in #cybersecurity. Recently, Tennisha Martin, Miki Demeter, and Katelyn Falk shared some...

https://infosec.exchange/@huxley...

Representational parity is a continuing struggle in . Recently, Tennisha Martin, Miki Demeter, and Katelyn Falk shared some helpful strategies and tactics that have helped initiatives.

ICMYI. Watch the replay youtube.com/watch?v=U1yN1hyqCWI or read the writeup dianainitiative.org/we-are-in-.

Much thank to The Diana Initiative and @blackgirlshack for supporting the webcast.

5.4.2024 15:22Representational parity is a continuing struggle in #cybersecurity. Recently, Tennisha Martin, Miki Demeter, and Katelyn Falk shared some...
https://infosec.exchange/@huxley...

The We Are In This Together! webcast features industry leaders sharing strategies and tactics that have been successful in improving DEI...

https://infosec.exchange/@huxley...

The We Are In This Together! webcast features industry leaders sharing strategies and tactics that have been successful in improving DEI parity. I'm looking forward to hearing their insights! Please make sure to attend it on March 20.

tdi.mobi/we-are-together

14.3.2024 17:18The We Are In This Together! webcast features industry leaders sharing strategies and tactics that have been successful in improving DEI...
https://infosec.exchange/@huxley...

😱how did I not know this until today?! 🙀💨

https://infosec.exchange/@huxley...

😱how did I not know this until today?! 🙀💨

26.2.2024 12:29😱how did I not know this until today?! 🙀💨
https://infosec.exchange/@huxley...

I wonder if when Salt-N-Pepa wrote Push It, they realized how often that song would be used for potty training.

https://infosec.exchange/@huxley...

I wonder if when Salt-N-Pepa wrote Push It, they realized how often that song would be used for potty training.

20.2.2024 13:47I wonder if when Salt-N-Pepa wrote Push It, they realized how often that song would be used for potty training.
https://infosec.exchange/@huxley...

@BSidesNYC 0x03 Recap: In this session, Anita D'Amico, discusses strategies for securing your software supply chain, how it's very...

https://infosec.exchange/@huxley...

@BSidesNYC 0x03 Recap: In this session, Anita D'Amico, discusses strategies for securing your software supply chain, how it's very different from , and her predictions on future trends.

youtu.be/pSSyDmux_f0?si=SD1ykR

1.2.2024 14:59@BSidesNYC 0x03 Recap: In this session, Anita D'Amico, discusses strategies for securing your software supply chain, how it's very...
https://infosec.exchange/@huxley...

Zach Wasserman from @Fleet and I had a fantastic conversation on his podcast where I gave him a sneak peek at what's coming for...

https://infosec.exchange/@huxley...

Zach Wasserman from @Fleet and I had a fantastic conversation on his podcast where I gave him a sneak peek at what's coming for @BSidesNYC 0x04. We also had a great conversation about advanced methods to enumerate vulnerabilities beyond rudimentary vuln scanning.

Please connect with me if you have any questions.

fleetdm.com/podcasts/expeditio

31.1.2024 14:57Zach Wasserman from @Fleet and I had a fantastic conversation on his podcast where I gave him a sneak peek at what's coming for...
https://infosec.exchange/@huxley...

Check out this @BSidesNYC 0x03 interview by Preeti Ravindra with Veena Susan Peediyakkal where she talks about how threat intelligence...

https://infosec.exchange/@huxley...

Check out this @BSidesNYC 0x03 interview by Preeti Ravindra with Veena Susan Peediyakkal where she talks about how threat intelligence supports the rest of the security organization and what it was like running a workshop at the conference.

youtu.be/Ko-arpF-j-I

30.1.2024 14:57Check out this @BSidesNYC 0x03 interview by Preeti Ravindra with Veena Susan Peediyakkal where she talks about how threat intelligence...
https://infosec.exchange/@huxley...

@BSidesNYC 0x03 Recap: DLL hijacking is old news.... but is it? In this session, Wietze Beukema takes us through how process-level...

https://infosec.exchange/@huxley...

@BSidesNYC 0x03 Recap: DLL hijacking is old news.... but is it? In this session, Wietze Beukema takes us through how process-level environment variable abuse is a viable vector for taking over legitimate applications.

youtu.be/pWyVOn0k1Tc?si=63wXRN

25.1.2024 14:16@BSidesNYC 0x03 Recap: DLL hijacking is old news.... but is it? In this session, Wietze Beukema takes us through how process-level...
https://infosec.exchange/@huxley...

A rare gem -- a full account of a supply chain attack!Normally, we never know the full details of supply chain attacks. Defenders piece...

https://infosec.exchange/@huxley...

A rare gem -- a full account of a supply chain attack!

Normally, we never know the full details of supply chain attacks. Defenders piece together clues, but typically there are gaps in the attack chain or timeline since the attack spans over a long period and potentially across multiple entities. In this article, John Stawinski and Adnan Khan documented in great detail how they executed a supply chain attack through and .

Three key takeaways for me:

1️⃣ Complexity is the number one reason that these attack vectors exist.

2️⃣ Complexity is creates the environment that allows the adversary to remain undetected. In this particular attack, they were able to suppress notifications and evade security controls.

3️⃣ Even after several notable supply chain attacks (e.g., and TeamCity), unsecured development secrets continue to be a boon for offsec, especially in supply chain attacks.

It's a fascinating read. They hope to talk more about this at "a certain security conference in LV, NV." I hope their talk gets accepted.

johnstawinski.com/2024/01/11/p

24.1.2024 15:13A rare gem -- a full account of a supply chain attack!Normally, we never know the full details of supply chain attacks. Defenders piece...
https://infosec.exchange/@huxley...

@BSidesNYC 0x03 Recap: In this session Marcus Hallberg shows us how to use snapshots of volatile memory in Google Kubernetes Engine kernels...

https://infosec.exchange/@huxley...

@BSidesNYC 0x03 Recap: In this session Marcus Hallberg shows us how to use snapshots of volatile memory in Google Kubernetes Engine kernels to troubleshoot current node activities or support a security investigation.

youtu.be/r0JGLcRLW9E?si=-KNU7L

23.1.2024 14:43@BSidesNYC 0x03 Recap: In this session Marcus Hallberg shows us how to use snapshots of volatile memory in Google Kubernetes Engine kernels...
https://infosec.exchange/@huxley...
Subscribe
To add news/posts to your profile here, you must add a link to a RSS-Feed to your webfinger. One example how you can do this is to join Fediverse City.
         
Webfan Website Badge
Nutzungsbedingungen   Datenschutzerklärung  Impressum
Webfan | @Web pages | Fediverse Members