USN C-2 COD takes the option at Palmdale, July 2018 #photography #militaryaviation #aviationphotography #planespotting #AvGeek #spotter #photography #aircraft #milair #nikon #palmdale #USN #C2 #COD
USN C-2 COD takes the option at Palmdale, July 2018 #photography #militaryaviation #aviationphotography #planespotting #AvGeek #spotter #photography #aircraft #milair #nikon #palmdale #USN #C2 #COD
Cette lecture parle de comment les groupes de libération en Afrique du Sud ont créé des systèmes de communication sécurisés pour appuyer leur combat contre l'oppression, tout en mettant en avant l'importance de se rassembler et de mieux contrôler la technologie.
Mais je me pose cette question : Comment est-ce que ces leçons du passé peuvent aider les mouvements d’aujourd’hui à gérer la surveillance numérique tout en cherchant à rester transparents? #mastodon #C2
Mastodon communities, be vigilant! Bad actors are creating accounts within the Fediverse and then using them to distribute malware. We identified one such case in which the threat actor had gone undetected since 2022. That Mastodon instance was one with a climate change focus. The threat actor was distributing an information stealer through their account.
We are happy to have helped the instance owner figure out why they have been on blocklists intermittently for the last few years, but also get that particular threat out of their Mastodon instance and safe for users.
There are undoubtedly many more of these across the Fediverse. Hopefully more awareness can get them detected and shut down faster.
For our fellow security nerds... this was #vidar malware with sha256 975932eeda7cc3feea07bc1f8576e1e73e4e001c6fe477c8df7272ee2e0ba20d
and a c2 IP 78[.]47[.]227[.]68 from the instance.
there is still at least one more Mastodon instance impacted that we are trying to reach.
#malware #stealer #mastodon #threatintel #cybercrime #threatintelligence #cybersecurity #infosec #infoblox #infobloxthreatintel #fakeaccounts #c2
Good grief. Where are the god damned adults? Is there never a time when these people are not beguiled and mesmerized by shiny, techno-babble wrapped BS?
At least in the 80s with SDI they literally knew they were just burning taxpayer $ on a pipe dream they knew they would never implement…
Next up: LARPing A Canticle for Liebowitz.
I claim dibs on the holy shopping list.
#AI #C2 #nukes
https://www.airandspaceforces.com/stratcom-boss-ai-nuclear-command-control/
Jolla's new C2 phones now being delivered to owners hands +a fresh Sailfish OS 5.0.0.21 upgrade named "Tampella"
"Tampella" is an idyllic location in the city of Tampere (where Jolla's roots situate)
◉Browser engine upgraded to ESR91
◉UI translation update
◉Blocking of incoming calls from preset numbers
◉Internet sharing (hotspot) fix
◉New ambiences
◉...much more!
https://forum.sailfishos.org/t/release-notes-tampella-5-0-0-21-for-jolla-c2/20558
#Jolla #SailfishOS #mobile #Linux #phones #C2 #Tampere #Tampella #Suomi #Finland @jolla
Realized that I never did an #introduction so here goes.
My name is Chase or Charles from #Dallas i’ve been in #IT and #infosec for almost a decade. I started out in helpdesk in college and moved onto #appsec and then #DFIR and malware reverse engineering. After my stint on the #blueteam side of the house I moved to #redteam and #pentesting by getting my #OSCP and #OSCE and worked there for 4 years where I got to do a lot of fun stuff like write a #c2 and find a number of #0days. Now I’m the CTO of Vector0 where we are building an attack surface management platform.
Outside of work while at home I mainly spend time #gaming or doing projects around my house and spending time in my pool. Otherwise I try to get as far away from a screen as possible by traveling and hiking/camping in places where I can’t be reached.
#introduction
HI! I'm a security researcher interested in weird things on the Internet. In particular, I love following rabbit holes around phishing emails and infrastructure, C2s, and botnets.
I got my start in tech in data science, where I helped colleagues find users who were doing "weird" and "interesting" things with our company's software. They wanted to find users who were pushing the boundaries of the software, not doing nefarious things, necessarily.
TL;DR I've spent most of my career looking for weird stuff in data.
Now, I'm especially interested in applications of data science methods–including but NOT limited to AI/ML–to problems in the infosec space.
Excited to see the community here and get to know others with similar interests!
#phishing
#c2
#botnet
#cybersecurity
#ai
#machinelearning