Bob Lord ๐Ÿ” :donor:

Personal account where the owls are not what they seem.
๐Ÿฆ‰๐Ÿ”๏ธ๐Ÿ”๏ธ๐Ÿชตโ˜•๐Ÿฉ๐Ÿฅง๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ‘
Also:๐Ÿ”๐Ÿ”‘๐Ÿ”’๐Ÿ’ป

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-06-19

@USBTypeSteve That's very practical, but the warnings from security people were about getting hacked.

We tell people other things that have no basis in fact, and that are equally futile. Why did that one die and the others live? Serious question. ๐Ÿค”

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-06-19

Once hacklore, now forgotten: why did we stop telling people to shut down their computers for safety?

medium.com/@boblord/the-hacklo

Tombstone that says "Turn off your computer"
Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-06-14

"Create an image that summarizes what you know about me."

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-05-28

A 23-page hardening guide. A CVE on CISAโ€™s Known Exploited Vulnerabilities list. And a product that left critical security outcomes in the hands of its customers. I walked through a hardening guide and what I found was a case study in why Secure by Design principle #1 matters. Read the full breakdown:

medium.com/@boblord/hardening-

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-04-24

@nelsondev
"What does it say?"
"Ask it"
...
"I thought so"

Bob Lord ๐Ÿ” :donor: boosted:

As someone who spends a portion of my workdays running logging and monitoring systems, itโ€™s amazing to me that this image is NOT more widely used in #cybersecurity #infosec

A screen capture from the TV show Twin Peaks. A woman in a sweater is holding what looks to be firewood, text on the screen reads โ€œmy log has something to tell youโ€
Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-04-05

Looking at your work today, are you using local data to make local decisions that will only have local outcomes?

What could you change to create bigger outcomes?

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-03-24

Is it too soon for enterprise software customers to demand Y2038 testing and resilience? If so, what date should they start demanding it? ๐Ÿ“†

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-03-17

@petrillic It took me a while to get to that conclusion but thatโ€™s what Iโ€™m doing now. Surprisingly, Zotero has the best interface for highlighting PDFs across any platform. Itโ€™s a game changer.
Also: Chromebook support! (Mostly)

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-02-24

Happy Twin Peaks Day to all who celebrate!
๐Ÿ—ป๐Ÿ—ป๐Ÿฆ‰๐ŸŒฒ๐Ÿชต ๐Ÿ’๐Ÿฅงโ˜•๏ธ๐Ÿฉ ๐Ÿ•ต๐Ÿผโ€โ™€๏ธ ๐Ÿ‘๐Ÿป

Bob Lord ๐Ÿ” :donor: boosted:
2025-02-24

Pro tip: set your logs to be all UTC. This will save your forensic analyst (who bills by the hour) the trouble of having to convert timestamps (and even figuring out which timestamps are in which TZ).

It also keeps them ordered correctly when forwarded to a SIEM, especially from multiple TZ's.

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-02-23

I re-installed. iCloud Private Relay may be causing some confusion in the tracking of network connections. Need more experimentation.

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-02-22

MacOS security peeps: Given the improvements in MacOS security over the past 5+ years, are you still using Little Snitch? If so, what unexpected or illegitimate activity have you prevented? ๐Ÿ™

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-02-22

The default is "no security" with Chrome extensions, at least in my recent personal experience. There's no way the average person has the tools or background to assess this type of risk.

Chrome extension asking for permissions to read and change all data on all websites.
Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-02-21

We're in the consumer HTTPS endgame. We need to finish the job so I can be certain all my mobile traffic is protected.

Please join me in asking the OS and browser makers to keep pushing and to finish the job in 2025, perhaps by Halloween! ๐Ÿ‘ป ๐Ÿ”

buff.ly/41qPpUM

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-02-17

I want to have Google Docs read my docs aloud to me but there's no good native feature. The extensions I looked at require excessive permissions.
Any recommendations?

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-02-14

If we mean "passwords", can we just say that rather than using the overly broad term "credentials"? Let's all speak a little more plainly.

Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-02-13

I'm tired of reading about "sophisticated actors" who just asked for and were given the admin password. Has anyone produced a classification scheme to rate threat actors and the tactics they used?

"Sure it was a Class 1 threat actor, but they just used a Class 4 attack vector".

Links welcome!

Bob Lord ๐Ÿ” :donor: boosted:
K. Reid Wightman :verified: ๐ŸŒป :donor:reverseics@infosec.exchange
2025-01-31
an amp that goes to 11, but instead of 11 there is a number marked '../'
Bob Lord ๐Ÿ” :donor:boblord@infosec.exchange
2025-01-30

I'm sensing something... the picture is getting clearer...
AHA!
Was it a ๐™ข๐™š๐™ข๐™ค๐™ง๐™ฎ ๐™จ๐™–๐™›๐™š๐™ฉ๐™ฎ defect?
๐ŸŽฉ ๐Ÿช„ โšก

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst