Mostly post about work stuff, maybe some improv stuff and maybe even magic some day. Seattle-based (originally Canadian), queer, cybersecurity nerd.
(He/him)
...then I logged into my account and discovered it's real.
...then I logged into my account and discovered it's real.
Two more days, what other crazy ideas will fall out of my brain?
Two more days, what other crazy ideas will fall out of my brain?
Our analysis of 51.2M sessions points to backbone-level port 23 filtering by a Tier 1 transit provider.
Our analysis of 51.2M sessions points to backbone-level port 23 filtering by a Tier 1 transit provider.
#Ivanti #ThreatIntel #CVE20261281 #InfoSec
#Ivanti #ThreatIntel #CVE20261281 #InfoSec
research.checkpoint.com/2020/inj3cto...
research.checkpoint.com/2020/inj3cto...
The movie was somehow worse than I expected it to be!
The movie was somehow worse than I expected it to be!
This #WorldCancerDay, FRANCE 24 takes a look at how #AI is being developed as a tool for treatment.
Watch to learn more ⤵️
#magic
#magic
One deploys cryptominers. The other opens reverse shells.
We dug into the infrastructure. What we found goes back to 2020.
One deploys cryptominers. The other opens reverse shells.
We dug into the infrastructure. What we found goes back to 2020.
I look forward to "watch this amazing Superbowl ad!!!" being over - an ad's an ad, block it
I look forward to "watch this amazing Superbowl ad!!!" being over - an ad's an ad, block it
at least have some class and write some sql-injectable php. maybe a little stack buffer overflow as a treat.
at least have some class and write some sql-injectable php. maybe a little stack buffer overflow as a treat.
arstechnica.com/security/202...
arstechnica.com/security/202...
GreyNoise just caught a ~100x spike in recon on CVE-2025-0282 featuring one loud AS213790 campaign and one sneaky botnet spread across 6K IPs.
We broke down the infra + what defenders should do next. 👇
GreyNoise just caught a ~100x spike in recon on CVE-2025-0282 featuring one loud AS213790 campaign and one sneaky botnet spread across 6K IPs.
We broke down the infra + what defenders should do next. 👇
Cursor lies about vibe-coding a web browser with AI
Cursor lies about vibe-coding a web browser with AI
Recall brings time-series analysis to GNQL so you can see how scanning and exploitation evolved.
See the timeline. Find the pattern.
Recall brings time-series analysis to GNQL so you can see how scanning and exploitation evolved.
See the timeline. Find the pattern.
React RCE, VPN brute forcing, and router scanning—all linked to the same infrastructure.→ 1.7M React attacks
→ 506K VPN targets
→ 3 IPs behind 1.8M router attempts
This week's At The Edge preview: greynoise.io/contact
React RCE, VPN brute forcing, and router scanning—all linked to the same infrastructure.→ 1.7M React attacks
→ 506K VPN targets
→ 3 IPs behind 1.8M router attempts
This week's At The Edge preview: greynoise.io/contact