Caitlin Condon
@catc0n.bsky.social
760 followers 500 following 150 posts
Adventurer. Takes a lot of photos, calls many places home. VP of research @VulnCheck. Previously vulnerability research director @Rapid7 / @metasploit.
Posts Media Videos Starter Packs
Reposted by Caitlin Condon
malwarejake.bsky.social
More governors need to stand up like this.

I'm no fan of Newsom generally, but he's at least not rolling over for the administration. California is better off for it.
briantylercohen.bsky.social
Gavin Newsom announces that any California university that caves to Trump and signs his “loyalty pledge” will be immediately defunded.

“CALIFORNIA WILL NOT BANKROLL SCHOOLS THAT SELL OUT THEIR STUDENTS.”
Reposted by Caitlin Condon
j91321.bsky.social
I haven't found exploitation of Fortra's GoAnywhere MFT CVE-2025-10035 in EDR telemetry yet. Which means it is probably still rare and folks have some time to patch. Wonder how long it will stay that way. The previously exploited vulns appeared fairly quickly.
catc0n.bsky.social
It seems like there’s still a piece of the story missing re: the private key.
Reposted by Caitlin Condon
katmabu.bsky.social
I don’t think I’ve ever loved anything as much as ICE loves violently attacking women.
bradlander.bsky.social
I was back at 26 Federal Plaza today, where an ICE agent violently threw this bereft woman to the ground in front of her kids. She had not touched him. She did not pose any threat. She had to be taken to the hospital. (🎥: Elias Eliahu)
Reposted by Caitlin Condon
agreenberg.bsky.social
The Secret Service isn't claiming it foiled any plot targeting the UN General Assembly. Just that a big collection of SIMs (probably used for fraud) could have *potentially* disrupted NYC cell service. The SIMs were in a *35 MILE* radius of the UN.

These headlines are all pretty egregiously wrong:
catc0n.bsky.social
Last night, Fortra disclosed a critical vulnerability in their GoAnywhere MFT file transfer product. CVE-2025-10035 has a virtually identical description to CVE-2023-0669, which was exploited by ransomware crews. Unclear if this one has been exploited. Patch now. www.vulncheck.com/blog/cve-202...
CVE-2025-10035: Critical Vulnerability in Fortra GoAnywhere MFT | Blog | VulnCheck
A new critical vulnerability was disclosed in Fortra's GoAnywhere managed file transfer product, which has been targeted in the past by ransomware and extortion groups
www.vulncheck.com
Reposted by Caitlin Condon
davewalker.bsky.social
Possible causes of your problems. It’s a diagram that (sadly) still seems relevant in 2025, so reposting a year and a bit on.
Diagram titled 'Possible causes of your problems'. On the left hand side, subtitled 'Yes': Funding removed from local councils, growing gap between rich and poor, multinational companies not paying their taxes, lack of new affordable housing, government not investing sufficiently in schools and healthcare. On the right hand side, subtitled 'No': Picture of small boat, with arrow; 'People fleeing horrific situations that you and I can't imagine'.
catc0n.bsky.social
Hey, security research friends! You know how vulnerability disclosure coordination is the most painful part of vuln research? Good news: VulnCheck will do it for you! You get credit, we handle the CVEs + vendor discussions.

Report vulnerabilities for disclosure here: vulncheck.com/advisories/r...
VulnCheck - Outpace Adversaries
Vulnerability intelligence that predicts avenues of attack with speed and accuracy.
vulncheck.com
catc0n.bsky.social
A beautiful, tender piece about grief and aging and friendship and the sacred call to haunt: joysullivan.substack.com/p/when-to-ca...
When to call the witches
1-800 dark magic
joysullivan.substack.com
catc0n.bsky.social
Quote from the VulnCheck team exploit mines 2025-09-11T19:24:00Z
A meme with the black spinning top from the movie "Inception". It's on a beige-ish background and the text of the meme says "It's like...a third-order command injection."
Reposted by Caitlin Condon
esqueer.net
Gen Z in Nepal burned down the parliament, burned down the homes of government officials, forced the prime minister to resign, and paraded the finance minister through the streets nearly naked.
catc0n.bsky.social
I know NPM and SAP and probably other acronyms are on fire today, but @vulncheck.bsky.social put out a Chrome extension for #CVE and #exploit intel and it's saving me kind of a lot of tab-switching effort, so you get 🎉 🤠posts from me instead of 🗑️🔥 posts www.vulncheck.com/blog/vuln-ch...
VulnCheck Insights: CVE Context at the Hover of Your Cursor | Blog | VulnCheck
Instead of bouncing between tabs, you now get instant, current context the moment a CVE appears on your screen.
www.vulncheck.com
Reposted by Caitlin Condon
theplanetaryguy.bsky.social
Friends, for your Friday, here's a new image of planets being born.
catc0n.bsky.social
The inverse of this skeet is "Some enterprising young sys admins used example machine keys for production deployments, which is also significantly less surprising than anyone reading docs."
Reposted by Caitlin Condon
ransomwaresommelier.com
There is something soothing about watching a baseball diamond get steamrolled.
catc0n.bsky.social
Holy speaker agenda, Batman! This is a shameless plug that is also wholly sincere: @vulncheck.bsky.social is hosting our inaugural THREATCON1 in VA Sept. 21 and 22. The conference is free, Jen Easterly and Andrew Boyd are keynoting (!), and the talk tracks slap. COME!! www.threatcon1.org/agenda
THREATCON1 Agenda
www.threatcon1.org
catc0n.bsky.social
Great metaphor
rikferguson.com
I learned this the hard way, one glance at my phone on a mountain road and I nearly wiped out a group of cyclists. A second of divided attention turns a safe system into a weapon.
Security fails the same way. Speed limits are compliance; safe driving is judgement.
#cybersecurity #OTsecurity #risk
Defensive Driving for Cybersecurity
Eyes up, read the road, and manage to impact. I learned this the hard way.
www.linkedin.com
catc0n.bsky.social
"I hate this piece of crap."

Quote from the team #exploit mines 2025-08-26T21:48:00Z

(am I doing ISO 8601 right, since this is apparently what we are doing now?)