Twitter | Search | |
SwiftOnSecurity
Systems security, industrial safety, author + , write SciFi, sysadmin, & use Oxford commas. they/them/tay
104,240
Tweets
8,359
Following
279,258
Followers
Tweets
SwiftOnSecurity 5h
Replying to @cullend
Tim tbone is the best I can do
Reply Retweet Like
SwiftOnSecurity 6h
Replying to @scot4
<3
Reply Retweet Like
SwiftOnSecurity 6h
Replying to @TheAnneLister
The Bridges of Madison County. Saw it as a teen and thought the performance was one of the most marvelous things ever.
Reply Retweet Like
SwiftOnSecurity retweeted
Rich Coogan 10h
My official rule is if I hit 75% of the required and 50% of preferred I apply.
Reply Retweet Like
SwiftOnSecurity 6h
Replying to @balajis @rezendi
😮
Reply Retweet Like
SwiftOnSecurity retweeted
SwiftOnSecurity 10h
Replying to @janipewter
My thoughts on OCSP traffic is kernel malware using revoked signatures. If you have a truly isolated environment the attacker whole stole a code signing cert has no repercussions.
Reply Retweet Like
SwiftOnSecurity 10h
Replying to @janipewter
My thoughts on OCSP traffic is kernel malware using revoked signatures. If you have a truly isolated environment the attacker whole stole a code signing cert has no repercussions.
Reply Retweet Like
SwiftOnSecurity 10h
Thread on apologies. They are pretty trivial to write even somewhat correctly. Hell you can google it. They don’t have to be sniveling prostrations. But so often they tap directly into the psyche of the person writing them. It’s like a line too far, even for the manipulative.
Reply Retweet Like
SwiftOnSecurity 10h
Replying to @hacks4pancakes
I fully endorse people applying for jobs the description they don’t meet precisely. But once you made it clear it required literal RE, he should have apologized and said he’d seen other jobs where they confused the terms, and hung up...
Reply Retweet Like
SwiftOnSecurity 11h
Replying to @dntlookbehindu
WSUS only trusts Microsoft content signatures.
Reply Retweet Like
SwiftOnSecurity 11h
Ahahahaha Someone get this poor soul a new job
Reply Retweet Like
SwiftOnSecurity 11h
Replying to @Atlas_Shruggd
That’s part of the voice model I’m sure of it
Reply Retweet Like
SwiftOnSecurity 11h
Replying to @CommanderApaul
Oh god
Reply Retweet Like
SwiftOnSecurity retweeted
Jessica Valenti 16h
Arguing over the details of what precisely constitutes a concentration camp is a pretty good sign that we are fucked
Reply Retweet Like
SwiftOnSecurity 12h
What are some URLs you allow through corporate firewall unauthenticated? Antivirus updates, OCSP to large providers, what else?
Reply Retweet Like
SwiftOnSecurity 14h
🤔
Reply Retweet Like
SwiftOnSecurity retweeted
Kate ☘️ 14h
Replying to @SwiftOnSecurity
I mange our phishing reporting mailbox...you’re my go-to!
Reply Retweet Like
SwiftOnSecurity 14h
Replying to @emschec @campuscodi
If you could allow enterprises to change the top5k warning to a gray flag and expose a REST connection URI for it to report to our SecOos team as well, that would be pretty interesting.
Reply Retweet Like
SwiftOnSecurity retweeted
Catalin Cimpanu 19h
Replying to @campuscodi
Google also released Chrome v75.0.3770.100, which now also comes with warnings against lookalike and deceptive URLs
Reply Retweet Like
SwiftOnSecurity 14h
Replying to @KateCounter
:O
Reply Retweet Like