@oriole Gday!
@ravirockks I think this account was hacked (password intercepted)
@stux what is happening here?
Only those who have been here will understand 😔
https://twitter.com/frontlinekit/status/1651339818889097217
Reposted from Twitter by @nafobot
Evening mograph. I was mostly done building a new node to do something when I realized my existing stuff already did it. Behold.... uh, flying wireframes. Shades of old screensavers, as usual.
#Blender3D #B3D #GenerativeArt #3DArt
Gallup reports that favorability of Russia is lower than it has been at any time during the 34 years that they have been tracking it.
"I've actually seen people who aren't programmers, and they're not software engineers, and they've never done security research and they are having a whale of a time with this, because you can be a hacker now just typing English into a box"
@simon Prompt-Kiddies
@simplebadger27 carrier sets the timezone - when your phone is in particular spots it picks up a cell tower that is on the different timezone and your phone updates the TZ based on that carrier setting change. (And then back again when your phone sees your own cell towers again).
@mysk how could they get this Sooo wrong??!
Google has just updated its 2FA Authenticator app and added a much-needed feature: the ability to sync secrets across devices.
TL;DR: Don't turn it on.
The new update allows users to sign in with their Google Account and sync 2FA secrets across their iOS and Android devices.
We analyzed the network traffic when the app syncs the secrets, and it turns out the traffic is not end-to-end encrypted. As shown in the screenshots, this means that Google can see the secrets, likely even while they’re stored on their servers. There is no option to add a passphrase to protect the secrets, to make them accessible only by the user.
Why is this bad?
Every 2FA QR code contains a secret, or a seed, that’s used to generate the one-time codes. If someone else knows the secret, they can generate the same one-time codes and defeat 2FA protections. So, if there’s ever a data breach or if someone obtains access .... 🧵
Disaster alert accounts are preparing for a world after Twitter https://www.theverge.com/2023/4/21/23691784/elon-musk-twitter-disaster-alert-accounts-fire-storm-tsunami-earthquake
ATT&CK is lucky to have a community who has supported us all these years! As of today ATT&CK v13 is out with some🎁paying that back. Improved website search (after your fist query where it loads the index), much more detailed changelogs, some detections now include analytics & more! Our blog post with what's new: https://medium.com/mitre-attack/attack-v13-enters-the-room-5cef174c32ff.
We’re also at #RSAC2023 this week if you’d like to discuss the release in person or grab some ATT&CK technique stickers. @whatshisface and @jamieantisocial are holding down the fort in the MITRE booth.
Took part in my first Byte Jam last night and this is what I came up with. Big thanks to everyone involved! #tic80 #livecoding #demoscene
@daedalus ABB?!