Interesting analysis of the Sakula malware used in the aviation thefts mentioned in my previous post.

It's nice to now have a short post by Bruce Schneier I can point to every time someone comes up with "public key crypto is doomed because of quantum computers" FUD:
He's referencing the earlier "factorizing RSA with a 20-million qubit quantum computer" paper, and notes that we're not anywhere near being able to build such a computer. So, yes, RSA is still doomed eventually, but not before some considerable technology leap happens. Quite a way from 100 qbits to 20 million.

~Open Source Security Tool of the Day~

PARSEC is the Platform AbstRaction for SECurity, a new open-source initiative to provide a common API to secure services in a platform-agnostic way.

Without man pages and the :archlinux: Arch Wiki, I wouldn't be the man I am today :think_mind_blown:

My favorite bit:
"who needs microcontrollers when you're running away from cannibals"

'Collapse OS' Is an Open Source Operating System for the Post-Apocalypse
The operating system is designed to work with ubiquitous, easy-to-scavenge components in a future where consumer electronics are a thing of the past.

HostsMan · Windows hosts files management

HostsMan is a freeware application that let's you manage your hosts file with ease.

~Open Source Security Tool of the Day~

Steven Black's Host List

Extending and consolidating hosts files from several well-curated sources like,,,, and potentially others.

AMITT (Adversarial Misinformation and Influence Tactics and Techniques) is a framework designed for describing and understanding disinformation incidents. AMITT is part of misinfosec - work on adapting information security (infosec) practices to help track and counter misinformation, and is designed as far as possible to fit existing practices and tools.

Framework diagram:

If you know MITRE ATT&CK Framework, you'll appreciate this!

Vorführeffekt is a word I am going to try and use in work-life since it seems to occur so often.

Top DNS Recon Tools and Techniques

Learn what is DNS enumeration, popular techniques, and tools for your DNS recon process when you are collecting data about your target.

Funny how nobody warning about DoH ever notices that "organisations" could indeed run their own DoH/DoT servers and implement any policy they like

Main limitation being of course that it would require ten year long transition program as your whole "organisational" DNS runs on some ancient crap commercial or cloud nameserver, who only heard about DoH/DoT in 2019 and it's just as new to them as say IPv6

Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.