Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Antigravitas
Dec 8, 2019

Die Rettung fuer die Landwirte:
That's normal in the PHP ecosystem. It's also normal to have your configuration files in your webroot.

Adbot
ADBOT LOVES YOU

uninterrupted
Jun 20, 2011
peehpee

Wild EEPROM
Jul 29, 2011


oh, my, god. Becky, look at her bitrate.
ownedcloud

sb hermit
Dec 13, 2016





Trabisnikof posted:

own cloud indeed

haveblue
Aug 15, 2005



Toilet Rascal
pwnCloud

spankmeister
Jun 15, 2008






pwned clowns

well-read undead
Dec 13, 2022

i was like "what the gently caress is owncloud" so i went to their site and saw this



but i guess it's not like it says "secure by implementation"

Shame Boy
Mar 2, 2010

well-read undead posted:

i was like "what the gently caress is owncloud" so i went to their site and saw this

it's for people who want to janitor their own dropbox server

shackleford
Sep 4, 2006

https://techcrunch.com/2023/11/29/founder-of-spyware-maker-hacking-team-arrested-for-attempted-murder-local-media/

quote:

The founder of the infamous and now-defunct spyware maker Hacking Team was arrested on Saturday after allegedly stabbing and attempting to murder a relative, according to multiple news reports.

David Vincenzetti, who launched Hacking Team in 2003, was arrested when police showed up to his apartment after his cousin called the police, local media reported, because he couldn’t reach his wife on the phone. According to Italian newspaper Il Giorno, the woman was visiting Vincenzetti, who reportedly had psychological issues, to take care of him. Vincenzetti allegedly stabbed the woman, and the police found her unconscious.

When Vincenzetti appeared before the judge, he did not talk about the incident, but rather rambled about work and his companies, prompting the judge to order prosecutors to look into his mental health state, according to La Stampa. The judge also ordered the man to stay in jail as a precautionary measure, the newspaper reported.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Trabisnikof posted:

own cloud indeed

mark immune
Dec 14, 2019

put the teacher in the cope cage imo
https://www.nationalreview.com/news/gay-furry-hackers-breach-u-s-nuclear-research-facility/

The group claimed responsibility for the attack in statements on public forums. “Meow meow meow meow meow meow meow,” the group wrote.

mark immune
Dec 14, 2019

put the teacher in the cope cage imo
repost but still lol

Truga
May 4, 2014
Lipstick Apathy

Shame Boy posted:

it's for people who want to janitor their own dropbox server

specifically, it's for people who want their own dropbox server, but haven't moved onto nextcloud when owncloud got bought by a lovely company and management made everyone who knew anything go away 9 *years* ago lmao

Antigravitas
Dec 8, 2019

Die Rettung fuer die Landwirte:
Owncloud is very much like OpenOffice. We moved to Nextcloud years ago and use it extensively with thousands of users.

Wiggly Wayne DDS
Sep 11, 2010



well it's one way to finally get one of them arrested

Powerful Two-Hander
Mar 10, 2004

Mods please change my name to "Tooter Skeleton" TIA.


"what are you gonna do? Hack me?" - quote from man stabbed

Xakura
Jan 10, 2019

A safety-conscious little mouse!

Powerful Two-Hander posted:

"what are you gonna do? Hack me?" - quote from man stabbed

haveblue
Aug 15, 2005



Toilet Rascal
potential infosec/IT laffo in progress

earlier today I was suddenly banned from PSN, and I'm too much of a goody two shoes for it to be deserved. phone and chat support couldn't help me or even give me sony's rationale, other than one guy who intimated it was a lockdown in response to suspicious login attempts. it looked like I was just cut off from years of cheevos and thousands of dollars of purchases for no reason whatsoever

now it looks like this is a global phenomenon and there's a huge wave of wrongly banned PSN users today

place your bets on whether sony got got by blackhats again or whether they hosed it up all by themselves

haveblue fucked around with this message at 02:47 on Dec 5, 2023

post hole digger
Mar 21, 2011

knowing nothing about the issue my moneys on sony fuckup

mystes
May 31, 2006

post hole digger posted:

knowing nothing about the issue my moneys on sony fuckup

SIGSEGV
Nov 4, 2010


post hole digger posted:

knowing nothing about the issue my moneys on sony fuckup

Achmed Jones
Oct 16, 2004



the notion that somebody popped sony and then used that access to ban a bunch of random people seems really far-fetched

uninterrupted
Jun 20, 2011

haveblue posted:

potential infosec/IT laffo in progress

earlier today I was suddenly banned from PSN, and I'm too much of a goody two shoes for it to be deserved. phone and chat support couldn't help me or even give me sony's rationale, other than one guy who intimated it was a lockdown in response to suspicious login attempts. it looked like I was just cut off from years of cheevos and thousands of dollars of purchases for no reason whatsoever

now it looks like this is a global phenomenon and there's a huge wave of wrongly banned PSN users today

place your bets on whether sony got got by blackhats again or whether they hosed it up all by themselves

lol o dip that's why I'm blocked. probably saved me from burning my time on an awful free to play game so bless you psn, ever present argument for why availability trumps security

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

Achmed Jones posted:

the notion that somebody popped sony and then used that access to ban a bunch of random people seems really far-fetched

it could easily be a diversion tactic, create a crisis that the target needs to respond to so that they're too overwhelmed to do anything about you executing your actual goal

same reason people's email address gets signed up to thousands of spammy mailing lists after their amazon account gets popped

haveblue
Aug 15, 2005



Toilet Rascal
sony appears to have quietly cleaned this up

I think we all learned something about testing on prod today

Chunks Hammerdong
Nov 1, 2009

haveblue posted:

I think we all learned something about testing on prod today

It only goes wrong sometimes so it's worth the risk for the convenience.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

haveblue posted:

sony appears to have quietly cleaned this up

I think we all learned something about testing on prod today

We did, end users are a quick and free way to get QA testing for changes.

well-read undead
Dec 13, 2022

my org's infosec consultant wants us to start doing knowbe4 phishing tests. i know all the jaded computer touchers in this forum hate them, but is there evidence they're actually useful at the org level? like do they actually lead to better outcomes (i.e., fewer actually phished users) or is it more of a teaching-to-the-test type of thing, where all people really learn is how to spot the fake phishing test emails?

Achmed Jones
Oct 16, 2004



so the test doesn't generally effect actual outcomes of phishability or whatever. maybe it'll reduce the percentage or something, but the way that phishing works is not really a percentage game.

having the _proof_ that people fall for fishing may or may not help security teams achieve their goals. it basically comes down to whether or not whoever greenlights those programs actually understands that phishing is a free pass into basically every org on the planet. if they do (that is, if they're competent at security) there's no need to spend on phishing training other than what might be required for certification. if they do not, well, it can be useful to have numbers.

get prepared for half of the engineering org to start crowing about they're so smart and they made filters for messages with the phishing test headers or whatever, thus completely missing the entire point of the exercise. completely missing the point when it comes to hacker poo poo is pretty common though

Cold on a Cob
Feb 6, 2006

i've seen so much, i'm going blind
and i'm brain dead virtually

College Slice
I don’t read legit email, so I’m not gonna go back to reading phishing test emails either. I filter basically everything that isn’t from a known sender.

Cold on a Cob
Feb 6, 2006

i've seen so much, i'm going blind
and i'm brain dead virtually

College Slice
obvs that won’t work for many people but if you can avoid reading email from unknown senders it’s a pro move at work

Dr_0ctag0n
Apr 25, 2015
Probation
Can't post for 6 days!
The PhishER/PhishRIP stuff is helpful for auto containing actual threats that are reported by end users. The sample Phish of the week campaign will have realistic examples so people at least know what to look for but yeah most people just see them and delete them which doesn't indicate a pass or a fail, just that they "read" the e-mail.

well-read undead
Dec 13, 2022

i appreciate the insights. i'm just trying to determine how much of a stink to raise — if they're actually an effective tool, i will raise no stink; if they're ineffective but also only mildly irritating, i will raise a small stink; but if they are both ineffective and a giant pain in the rear end i will raise the biggest stink they've ever had the misfortune to smell

The Fool
Oct 16, 2003


Cold on a Cob posted:

I don’t read legit email, so I’m not gonna go back to reading phishing test emails either. I filter basically everything that isn’t from a known sender.

I filter out everything that isn't actually addressed directly to me.

post hole digger
Mar 21, 2011

well-read undead posted:

my org's infosec consultant wants us to start doing knowbe4 phishing tests. i know all the jaded computer touchers in this forum hate them, but is there evidence they're actually useful at the org level? like do they actually lead to better outcomes (i.e., fewer actually phished users) or is it more of a teaching-to-the-test type of thing, where all people really learn is how to spot the fake phishing test emails?

theyre useful to the extent that you might them for compliance purposes but i've never heard a very compelling answer to what the goal of a phishing test campaign is, or what specifically is being tested, or what the org's success/failure criteria is, especially with poo poo like knowbe4 where you basically have to bend the rules in your favor by whitelisting, changing spf rules, etc to nerf your own technical controls. phishing tests can have some value in helping train users for what an attack may look like, but the value gets massively overblown by companies making easy money selling the testing service.

post hole digger
Mar 21, 2011

well-read undead posted:

i appreciate the insights. i'm just trying to determine how much of a stink to raise — if they're actually an effective tool, i will raise no stink; if they're ineffective but also only mildly irritating, i will raise a small stink; but if they are both ineffective and a giant pain in the rear end i will raise the biggest stink they've ever had the misfortune to smell

how big of a pain in the rear end they are completely depends on the people conducting them and what happens when a user 'fails' the test

jammyozzy
Dec 7, 2006
<img src="https://fi.somethingawful.com/customtitles/title-jammyozzy.gif"><br>Is that a challenge?
The phishing test emails we get at work all come from the same domain so it was trivial to block them lol

lousy hat
Jul 17, 2004

bone appetit
Clapping Larry
if your company doesn’t do knowbe4 testing how will your users learn important words like vishing and smishing?

mystes
May 31, 2006

post hole digger posted:

how big of a pain in the rear end they are completely depends on the people conducting them and what happens when a user 'fails' the test
It's important to tell them they're getting a raise in the phishing email and then make fun of them for believing it

Adbot
ADBOT LOVES YOU

well-read undead
Dec 13, 2022

who need they phishussy smished

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply