DevTestSecOps


Channel's geo and language: Ukraine, English
Category: Technologies


Forwards and notes on development, testing, security, and operations from @q587p.
About me: studied as System Architect, worked as a SysAdmin, working now as an Test Automation Engineer. Also, I'm interested in hacking (and everything related to it).
జ్

Related channels

Channel's geo and language
Ukraine, English
Statistics
Posts filter


Forward from: vx-underground
This generation was the first to be raised online

Google harvested my data
Tumblr harvested my data
YouTube harvested my data
Vine harvested my data
DeviantArt harvested my data
Blogger harvested my data
Facebook harvested my data
Instagram harvested my data
Etsy harvested my data
Twitter harvested my data


#vibe #security


Larry Tesler, inventor of the cut, copy, and paste commands, dies at 74


Larry Tesler, inventor of the cut, copy, and paste commands, dies at 74


Forward from: vx-underground
You know what does well in a recession?

Cybercrime.

Threat Intel, Threat Actors, Defenders, Attackers — chat, we're so back. High 5s all around.




Forward from: feedback loop








Forward from: Мам, я DPO


#Oracle #hack


Forward from: vx-underground
A long time ago we posted "we need more women writing malware" and Infosec people lost their mind.

They immediately proclaimed writing malware is a crime. They called us bad names. They compared it to "we need more female killers".

The very people who say "hAcKeRs aRe MiSunDeRsTooD" and "HAcKiNg iSnT a CrImE" picked on us, imposing the same fate "hacking" once had.

Interestingly, some of those people who insulted us, mocked us, called us bad names, are now suddenly for "maldev" and malware research. It's interesting that when we were unpopular and small, we were an easy target and picked on.

Now that we're one of the largest infosec social media profiles, suddenly maldev and malware research is cool.

They seem to have forgotten. We haven't forgotten.






#programming #async




#security #Bluetooth #hack by #Apple #AirTag

An interesting topic on turning any Bluetooth device into an Apple AirTag tracker. Researchers have come up with a method that allows attackers to take the Bluetooth signal of any device, calculate a possible private key from the FindMy system, transmit it to Apple's FindMy servers, and then get the location of that unit.

https://nroottag.github.io/




Forward from: not really

20 last posts shown.