From The Blog
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 1225 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 735 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 1110 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 903 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 976 times Read more...
-
Leaked Data from Duolingo incident Shows US is most Impacted
Written by Sean KalinichDuolingo, is a language learning site (not to be confused with an LLM) and has a very large base of users. The site is a…Written on Tuesday, 29 August 2023 19:12 in Security Talk Read 1389 times Read more...
-
We talk about the Ransomware Threat Landscape with SecureWorks at Black Hat 2023
Written by Sean KalinichBlack Hat 2023 – Las Vegas, NV – One of my personal focuses is understanding the “Why” behind changes in the threat landscape. In simple…Written on Tuesday, 29 August 2023 18:26 in Security Talk Read 986 times Read more...
-
Now Patched Flaw Leverages Abandoned Reply URL found in Entra ID allows for Privilege Escalation
Written by Sean KalinichMicrosoft has not been having the greatest of months. First it was identified that a stollen MSA signing key was used by a Nation State…Written on Monday, 28 August 2023 15:39 in Security Talk Read 1605 times Read more...
-
Qrypt Looking to Attack the Inefficiencies in Quantum Encryption to make Quantum Secure Communication a Reality Today
Written by Sean KalinichBlack Hat 2023, Las Vegas – At Black Hat one of my favorite things to do is see what the latest buzzword(s)/phrases are. One of…Written on Monday, 28 August 2023 12:53 in Security Talk Read 1099 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 115676 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 85915 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 80300 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 78996 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 69152 times Read more...
Displaying items by tag: Twitter
Twitter reaches 200 million
![]() |
Twitter celebrated their sixth anniversary back in March. During the celebration the company announced that they had reached over 140 million active users per month and that there are around 340 million tweets made daily. [This is not a bad achievement, but it does make use wonder about the sheer amount of inane information that gets broadcast around the globe every day; 140 words at a time. –Ed]
Social Media Helps During A Disaster
![]() |
By now, everyone has heard of Hurricane Sandy, dubbed by some a “Franken-storm”, which has plunged much of the East coast into chaos. Millions upon millions of civilians lost access to power, and as NYC flooded, many were forced to evacuate. There were hundreds of thousands of calls, round the clock, to emergency lines like 911. Too many calls for many people to get through without waiting for a long period of time, so, some citizens took a less common approach to getting help.
Twitter stands behind its users
![]() |
After a New York court decided to request account information and tweets from Occupy Wall Street protester, Malcom Harris, Twitter responded with filling an appeal. Unlike Facebook, who has been accused of giving up their users’ data to legal institutions like it was something meaningless, Twitter has decided to stand their ground and defend their users’ privacy. Harris is being prosecuted for allegations of disorderly conduct during protests on Wall Street and information on his two accounts @destructuremal and @getsworse is being asked for by the court. For @getsworse they requested all public tweets and “[t]he following subscriber information: name; address; records of session times and durations; length of service (including creation date); types of service utilized; telephone or instrument number or any other subscriber number or identity, including any temporarily assigned network address.”
App.net – Are we getting an ad-free Twitter?
![]() |
“What @daltonc (Dalton Caldwell) is doing is pretty forward. If this succeeds it will be one for the history books, for sure". Is a statement made by Kristy Tillman, Designer at Ideo. This is just one of the feeds talking about a promising project called App.net. App.net is an alternative social network that users will have to pay to use. It is imagined to be a social service where users and developers are in the spotlight instead of advertisers. Its functions are much like Twitter, you are able to follow other users and see their updates.
New Twitter Malware Tries to Exploit Our Own Curiosity and Desire To See Ourselves On The Internet
![]() |
Remember the Faceboook malware we warned you about? You remember the one that relied on the fact that people love to see pictures of themselves on the internet? Well it looks like either the same group that was behind that malware or another equally clever group has moved from Faceboook to Twitter. We have heard multiple reports of tweets showing up that claim to have a link to a picture of the user. Unfortunately due to the widespread use of shortened links it is hard to spot many malicious payloads. Fortunately in this case you can identify the bad link by the .ru at the end… for now.
Twitter, Azure and Google Talk All Suffer From Outages Today; Not A Good Day For The Cloud
![]() |
Today was a bad day for the cloud as first Google Talk, then Microsoft Azure, and finally Twitter all faced outages that ran into hours of downtime or intermittent problems. The incident highlights one of the problems that companies face in putting their eggs in very large baskets. The outages began with Google talk and kicked off around 4am this morning (7-26-2012). This was not a simple issue with being able to connect to the servers though, it was something more widespread.
Skype Is No Longer A Secure Means Of Communication
![]() |
About two weeks ago we saw a random tweet that seemed to indicate that Microsoft had added in technology that would allow for easier spying on Skype conversations. Right after this a tweet on the YourAnonNews feed seemed to indicate that the “bug” that was accidentally sending some conversations to random members of your contact list was related to the new “feature”. There was a much more ominous tweet about an hour later that claimed Skype had been hacked and the source code downloaded. Although we never were able to confirm the relationship to the bug and the reworking of supernodes to switch to Microsoft run servers, we did find out that the released code was not the official source code, but a posting of a decompiled version of the Skype application; still useful if you wanted to look for an exploit, but not the original source code to be sure.
Is Someone Really Trying to Out "The Jester", or is He Trying to Leave with a Bang?
With all that is going on in the “hacker” world there is more drama today as someone is possibly claiming to maybe know who The Jester is. The catch, well it might be The Jester himself. To fill you in on a little background information; The Jester (also known as th3j35t3r) has made something of a name for himself in his activities against WikiLeaks, Anonymous, and other sites that do not agree with his politics. He has styled himself as a vigilante hacker and one that has the “power” to take down sites single handedly (with the right DDoS tools).
Twitter Says Users Own Thier Tweets, Files a Motion to Fight Request for Occupy Tweets
We missed this one on the 8th, but it is an important step for privacy right and the ability of the government to ask for everything they want. We had told you not that long ago how prosecutors were demanding information from Blogs, Twitter and other Social Media about people involved in the Occupy movement. This demand raised quite a storm as most felt it was an outlandish request (well actually prosecuting people for protesting is ridiculous as well) considering what they were after.