Remember yesterday when I told y’all some of the redactions were easy to remove? The Guardian has words.
People examining documents released by the Department of Justice in the Jeffrey Epstein case discovered that some of the file redaction can be undone with Photoshop techniques, or by simply highlighting text to paste into a word processing file.
Y’all, they used Acrobat. Because the #DOJ fired all the #infosec people who normally sanitize data, and told 1200 agents not trained in infosec to hide anything that might embarrass the #GuardiansofPedophiles, and this is the result.
Mastering Endpoint Management using Microsoft Intune Suite by Saurabh Sarkar and Rahul Singh is a hands-on guide to Intune’s premium features. Learn real-world implementation of Cloud PKI, EPM, EAM, Advanced Analytics, Remote Help, and Microsoft Tunnel with practical architecture insights and troubleshooting tips.
Mastering Windows Server 2025 by Jordan Krause continues to be a go-to guide for sysadmins managing and modernizing server environments. Written by a 10× Microsoft MVP, it covers real-world administration of AD, DNS, DHCP, GPO, Hyper-V, security, clustering, containers, and modern tools like PowerShell, Windows Admin Center, and Azure Arc.
This Gmail hack is unsettling not because it’s flashy, but because it’s bureaucratic. Attackers aren’t breaking encryption or outsmarting algorithms. They’re filling out forms. By changing an account’s age and abusing Google’s Family Link feature, they can quietly reclassify an adult user as a “child” and assume parental control. At that point, the rightful owner isn’t hacked so much as administratively erased.
The clever part is that everything happens inside legitimate features. Passwords are changed. Two-factor settings are altered. Recovery options are overwritten. And when the user tries to get back in, Google’s automated systems see a supervised child account and do exactly what they were designed to do: say no.
Google says it’s looking into the issue, which suggests this wasn’t how the system was supposed to work. But it’s a reminder of an old lesson. Security failures often happen when protective mechanisms are combined in ways …
This Gmail hack is unsettling not because it’s flashy, but because it’s bureaucratic. Attackers aren’t breaking encryption or outsmarting algorithms. They’re filling out forms. By changing an account’s age and abusing Google’s Family Link feature, they can quietly reclassify an adult user as a “child” and assume parental control. At that point, the rightful owner isn’t hacked so much as administratively erased.
The clever part is that everything happens inside legitimate features. Passwords are changed. Two-factor settings are altered. Recovery options are overwritten. And when the user tries to get back in, Google’s automated systems see a supervised child account and do exactly what they were designed to do: say no.
Google says it’s looking into the issue, which suggests this wasn’t how the system was supposed to work. But it’s a reminder of an old lesson. Security failures often happen when protective mechanisms are combined in ways no one quite imagined. The tools aren’t broken. The assumptions are.
There’s no dramatic fix here, only mildly annoying advice that suddenly feels urgent. Review recovery settings. Lock down account changes. Use passkeys. Because once an attacker controls the recovery layer, proving you’re you can become surprisingly difficult.
TL;DR 🧠 Family safety tools are being weaponized ⚡ Account recovery can be shut down entirely 🎓 Legitimate features enable the lockout 🔍 Prevention matters more than appeals
I feel like the most common attack vector for bad actors is not some crazy 0-day but attacking trust. And right now we’re trusting both AI answers and the traffic around those answers. That trust boundary feels softer every month as more and more people adopt AI into their lives. #InfoSec#AI
I feel like the most common attack vector for bad actors is not some crazy 0-day but attacking trust. And right now we’re trusting both AI answers and the traffic around those answers. That trust boundary feels softer every month as more and more people adopt AI into their lives. #InfoSec#AI
“Keystroke data from the laptop of a worker who was supposed to be in US should have taken tens of milliseconds to reach Amazon’s Seattle headquarters. Instead, the flow from this machine was more than 110 milliseconds, Amazon’s Chief Security Officer Stephen Schmidt told me.
The barely perceptible lag suggested the worker was half a world away.”
The year ahead is shaped by what you choose to learn now. Take 40% off everything with code HOLIDAY40 and build a foundation for deeper thinking and hands-on skill development. Sale ends Jan 2 at 11:59 PM PST.
It’s interesting how many people think wanting privacy means you’re doing something nefarious. The fact is, privacy is about sharing what you want with whom you choose.
(I don’t recall who wrote these words or where I originally saw them. I only made the graphic.)
Il reverse engineering consiste nell’analizzare software, hardware o protocolli per capirne il funzionamento interno, individuare minacce e costruire difese più solide.
Ecco una lista di strumenti per analisi malware e reverse engineering 😎👇
Trovi tutte le infografiche dedicate alla sicurezza informatica e molto altro sulla sicurezza su @sicurezza@diggita.com