Jake Williams

Breaker of software, investigator of incidents | GSE #150 | Faculty at IANS Research | Stuff: jake at malwarejake dot com | He/him

2025-04-23

On Tuesday morning near RSAC, I'll be presenting with at a fireside chat with @Secitup with IANS. We'll be talking about where you should (and probably shouldn't) use AI in your security operations, with specific examples and lessons learned. Join us!
iansresearch.com/ians-at-rsa-i

2025-04-22

Clients: I understand why you might want to record an IR tabletop exercise. The ability to review it later could be helpful. But it's almost certainly discoverable in litigation (yes, even if your internal counsel are present). The value simply isn't there given the outsized risk.

2025-04-11

I'm officially done pretending what happened to Oracle somehow didn't involve Oracle Cloud. Transparency from Oracle has been garbage. I literally cannot recommend OCI to any of my clients at this point.

By now, you've certainly heard about the data breach that took place on at least one server that Oracle emphatically states is NOT part of OCI (despite literally having the words "Oracle" and "cloud" in the compromised server's login URL).
2025-04-11

@Jacob Concur. I've already talked to several overseas DEFCON regulars who aren't coming this year.

2025-04-11

I predict RSAC is going to be a lot less heavily attended than past years. Between economic uncertainty and the VERY REAL risks of attendees traveling to the US, I suspect a lot of people will save the travel budget and just stay home. Hope I'm wrong, but kind of doubt it.

2025-04-09

You cannot simultaneously hold that "cybersecurity is a priority for the federal government" and "we're cutting CISA services with no replacements for federal agencies."

2025-04-09

This is your regular reminder (apropos of nothing in particular) that ransomware, an actual national security threat, only exists in its current threat because we fail to fully regulate off-ramps for crypto into fiat.
reuters.com/world/us/us-justic

2025-04-08

It is NOT GREAT(TM) to hear that threat actors were in OCC's network and reading emails for almost two years (timeline from paywalled Bloomberg article citing a memo from OCC to Congress).

It's even worse that OCC needed MSFT to notify them of the incident.
occ.gov/news-issuances/news-re

2025-04-08

If you're using Ivanti at the perimeter, I have to presume at this point that you enjoy incident repsonse. There's no other rational explanation...

2025-04-06

Working on some code and I have to say that while this is just a word wrap error, I can't think one that's more on point...

"vance confidence score below threshold"
2025-04-04

If you work in DevOps read this post-mortem. If you don't work in DevOps, send this to your coworkers that do. Trust me, it's important they read this.
landh.tech/blog/20250211-hack-

2025-04-03

Auto manufacturer Stellantis is laying off 900 people (at least) temporarily due to the new tariffs.

This is the first of many stories you'll read over the next month of tariffs "helping US manufacturing" if they're not repealed.
reuters.com/business/autos-tra

2025-04-03

@Cyberoutsider These come through Windows Store, so I think the security boundary there is "can malware get into Windows Store?"

2025-04-03

Again, Microsoft - unsolicited advertisements for games have NO PLACE in Windows 11 Professional. Please slap whoever decided this was appropriate.

Unoslicited Ad on Windows 11 Pro for a Microsoft game.
2025-04-02

Remember the part of required federal records management training that says "it's okay to use Gmail for work as long as you cc government accounts?"

Yeah, me neither...

2025-04-02

It's 2025 - please stop using the terms whitelisting and blacklisting. Yes, I know many of these terms were acceptable when you were growing up.

Continuing to use them today shows you're unable to adapt to change, which particularly in high-change environments like cybersecurity, is NOT a good look.

2025-03-31

This is Oracle actively covering up evidence of an intrusion. This is someone executing 1990's breach playbooks in 2025.

wayback machine screenshot showing that Oracle requested the URL showing a threat actor compromised their system to be exlcuded.
2025-03-31

@dsalo Wow - that's awesome.

2025-03-31

@j_angliss Well played.

2025-03-31

At this point, every statement I read from Oracle feels like one of those convos: "That looks like a nasty bruise, how'd you get it?" and they're like "I definitely wasn't having sex with a horse" and the answer leaves you with more questions than you had originally...

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst